Investigation of data transformation methods for the purpose of hiding from unauthorized persons using encryption algorithms
Автор: Gorkina K.N., Osipova A.S., Kholopov S.V.
Журнал: Экономика и социум @ekonomika-socium
Статья в выпуске: 12 (43), 2017 года.
Бесплатный доступ
In this article, we consider the definition of an encryption algorithm, its two generalized classes: a symmetric algorithm and an asymmetric one; asymmetric encryption scheme; classification of the symmetric cryptographic algorithm, a brief description of each type of algorithm.
Transformation, algorithm, symmetric, asymmetric
Короткий адрес: https://sciup.org/140235323
IDR: 140235323
Статья научная