Investigation of data transformation methods for the purpose of hiding from unauthorized persons using encryption algorithms

Автор: Gorkina K.N., Osipova A.S., Kholopov S.V.

Журнал: Экономика и социум @ekonomika-socium

Статья в выпуске: 12 (43), 2017 года.

Бесплатный доступ

In this article, we consider the definition of an encryption algorithm, its two generalized classes: a symmetric algorithm and an asymmetric one; asymmetric encryption scheme; classification of the symmetric cryptographic algorithm, a brief description of each type of algorithm.

Transformation, algorithm, symmetric, asymmetric

Короткий адрес: https://sciup.org/140235323

IDR: 140235323

Статья научная