Cryptographic Algorithms and Their Algoritmic Solutions
dc.contributor.advisor | Hannusch, Carolin | |
dc.contributor.author | Girgin, Ecem | |
dc.contributor.department | DE--Informatikai Kar | hu_HU |
dc.date.accessioned | 2022-04-18T09:14:57Z | |
dc.date.available | 2022-04-18T09:14:57Z | |
dc.date.created | 2022-04-18 | |
dc.description.abstract | In today's world, most of the actions are made through the internet. For example, in communication online, hundreds, thousands of messages are sent every day. How do we keep messages secure and not read from a third party? In basic answer, with the help of cryptography. Cryptographic algorithms are sets of methods or rules that are used to encrypt and decrypt messages in a cryptographic system. Cryptography keeps the data securely therefore it has a vital role in our lives. The report consists of brief information about cryptography history and the functioning structure of symmetric, asymmetric algorithms, and hash functions. The symmetric algorithms DES, 3DES, AES, and the asymmetric algorithms Diffie-Hellman, RSA, ECC, and hash functions, are analyzed regarding their features. | hu_HU |
dc.description.course | computer science engineering | hu_HU |
dc.description.degree | BSc/BA | hu_HU |
dc.format.extent | 40 | hu_HU |
dc.identifier.uri | http://hdl.handle.net/2437/330763 | |
dc.language.iso | en | hu_HU |
dc.subject | cryptographic algorithms | hu_HU |
dc.subject | symmetric algorithms | hu_HU |
dc.subject | asymmetric algorithms | hu_HU |
dc.subject | hash functions | hu_HU |
dc.subject.dspace | DEENK Témalista::Informatika | hu_HU |
dc.title | Cryptographic Algorithms and Their Algoritmic Solutions | hu_HU |