Lubbe, 1998 - Google Patents
Basic methods of cryptographyLubbe, 1998
- Document ID
- 12994264517572550060
- Author
- Lubbe J
- Publication year
External Links
Snippet
This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transmission of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a …
- 238000000034 method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lubbe | Basic methods of cryptography | |
| US6266413B1 (en) | System and method for synchronizing one time pad encryption keys for secure communication and access control | |
| AU2008327506B2 (en) | Method and system for encryption of data | |
| US6058189A (en) | Method and system for performing secure electronic monetary transactions | |
| US5315658A (en) | Fair cryptosystems and methods of use | |
| US6445797B1 (en) | Method and system for performing secure electronic digital streaming | |
| USRE36918E (en) | Fair cryptosystems and methods of use | |
| CN106534092A (en) | Message-based and key-dependent privacy data encryption method | |
| US10158613B1 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
| Jones et al. | Information security: A coordinated strategy to guarantee data security in cloud computing | |
| Yin et al. | Protecting private data by honey encryption | |
| Choi et al. | Password typos resilience in honey encryption | |
| CN111526021A (en) | Block chain private key security management method | |
| US10623384B2 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
| Abiega-L’Eglisse et al. | A new fuzzy vault based biometric system robust to brute-force attack | |
| CN108334786A (en) | A kind of data ciphering method | |
| EP1166491A2 (en) | System, device and method for secure communication and access control | |
| Prajanati et al. | Image security enhancement on cloud storage using AES algorithm | |
| Mohammed et al. | Cryptography and Network Security in Modern Era | |
| Chhetri | Novel approach towards authentication using multi level password system | |
| Pawar et al. | Survey of cryptography techniques for data security | |
| Kushwah et al. | Web Application Based Text Encryption | |
| Lopes | Implementation of Practical and Secure Methods for Storage of Cryptographic Keys in Applications | |
| GBESOR-ZOIKU | COLLEGE OF BASIC AND APPLIED SCIENCE DEPARTMENT OF COMPUTER SCIENCE | |
| Toliupa et al. | RF Signals Encryption with AES in WDID. |