Mostrar el registro sencillo del ítem
Cryptography: Algorithms and Security Applications
dc.rights.license | All rights reserved | en_US |
dc.contributor.author | Cruz, Alfredo | |
dc.contributor.author | Fernández, Maxime | |
dc.contributor.author | Díaz, Gloria | |
dc.contributor.author | Cosme, Alberto | |
dc.contributor.author | Negrón, Irtalis | |
dc.contributor.author | Negrón, Priscilla | |
dc.date.accessioned | 2022-05-06T15:07:54Z | |
dc.date.available | 2022-05-06T15:07:54Z | |
dc.date.issued | 2000-06 | |
dc.identifier.citation | Cruz, A. & Fernández, M. & Díaz, G. & Cosme, A. & Negrón, I. & Negrón, P. (2000). Cryptography: Algorithms and Security Applications, Revista de la Universidad Politécnica de Puerto Rico, 10(1), 7-16. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/1529 | |
dc.description | Volumen 10, Número 1, Junio 2000 | en_US |
dc.description.abstract | Cryptography in Computer Science and Information Systems are broad. It is based in a sequence of steps, and its premise is only one: security. One of the latest developments in cryptography is Steganography, which is the art of transmitting information in such a way that the very existence of the message is unknown. The purpose of steganography is to elude drawing suspicion to the transmission of a hidden message. If suspicion is developed, then the goal is overcome. Steganalysis is the art of assembling and rendering useless such concealed messages. This paper will give an overview of Cryptography. We will focus on the algorithms mostly used and the different techniques available for encryption. We will also explain the Digital Signature, Digital I.D process, Certification Authentication, X.509 Certificate Format, Certificate distribution, Digital Time-Stamping (DTS), and finally discuss the attacks and security features obtained through the Cryptography. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Revista de la Universidad Politécnica de Puerto Rico; | |
dc.relation.haspart | San Juan | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Subject headings--Unassigned | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Faculty--Research | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Undergraduates--Research | en_US |
dc.title | Cryptography: Algorithms and Security Applications | en_US |
dc.type | Article | en_US |
dc.rights.holder | Esta Junta Editorial y la Universidad Politécnica de Puerto Rico hacen constar y reconoce que los autores de los artículos, obras literarias y artísticas publicadas en esta Revista Politechnê, se reservan enteramente los derechos de autor y de publicación de los mismos para los efectos de cualquier ventualidad literaria, publicitaria o de cualquier índole. | en_US |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Revista Politechnê
Revista multidisciplinaria de la Universidad Politécnica de Puerto Rico (Vol. 1 | Núm. 1 | Junio 1991 - Vol. 22 | Núm. 1 | 2024