[go: up one dir, main page]

Lubbe, 1998 - Google Patents

Basic methods of cryptography

Lubbe, 1998

Document ID
12994264517572550060
Author
Lubbe J
Publication year

External Links

Snippet

This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transmission of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
Lubbe Basic methods of cryptography
US6266413B1 (en) System and method for synchronizing one time pad encryption keys for secure communication and access control
AU2008327506B2 (en) Method and system for encryption of data
US6058189A (en) Method and system for performing secure electronic monetary transactions
US5315658A (en) Fair cryptosystems and methods of use
US6445797B1 (en) Method and system for performing secure electronic digital streaming
USRE36918E (en) Fair cryptosystems and methods of use
CN106534092A (en) Message-based and key-dependent privacy data encryption method
US10158613B1 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
Jones et al. Information security: A coordinated strategy to guarantee data security in cloud computing
Yin et al. Protecting private data by honey encryption
Choi et al. Password typos resilience in honey encryption
CN111526021A (en) Block chain private key security management method
US10623384B2 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
Abiega-L’Eglisse et al. A new fuzzy vault based biometric system robust to brute-force attack
CN108334786A (en) A kind of data ciphering method
EP1166491A2 (en) System, device and method for secure communication and access control
Prajanati et al. Image security enhancement on cloud storage using AES algorithm
Mohammed et al. Cryptography and Network Security in Modern Era
Chhetri Novel approach towards authentication using multi level password system
Pawar et al. Survey of cryptography techniques for data security
Kushwah et al. Web Application Based Text Encryption
Lopes Implementation of Practical and Secure Methods for Storage of Cryptographic Keys in Applications
GBESOR-ZOIKU COLLEGE OF BASIC AND APPLIED SCIENCE DEPARTMENT OF COMPUTER SCIENCE
Toliupa et al. RF Signals Encryption with AES in WDID.