Encryption and Decryption Method Learning GOST.
Science Cryptography (symmetric key).
Input Text to be encrypted or decrypted and the key used.
01. Output Visualization of the steps taken in performing encryption and decryption
GOST method.
Encryption and Decryption Method Learning WAKE.
Science Cryptography (symmetric key).
Input Text to be encrypted or decrypted and the key used. 
02. Output Visualization of the steps taken in performing encryption and decryption
WAKE method.
Encryption and Decryption Method Learning IDEA.
Science Cryptography (symmetric key).
Input Text to be encrypted or decrypted and the key used.
03. Output Visualization of the steps taken in performing encryption and decryption
IDEA method.
Encryption and Decryption Method Learning Modular Multiplication-based Block Cipher.
Science Cryptography (symmetric key).
Input Text to be encrypted or decrypted and the key used. 
04. Output Visualization of the steps taken in performing the encryption and decryption
MMB method.
Learning Prima Rabin Miller test, Solovay Strassen and Lehmann.
Cryptography Science (Tests Prima).
Added Value will be the test of excellence.
05. Output Step-by-step testing prime numbers in accordance with the method chosen.
Public Key Cryptography LUC learning.
Science Cryptography (Key Private / Public).
Input Text to be encrypted or decrypted and used the private key.
06. Output Step-by-step establishment of a public key, the processes of encryption and decryption.
Learning Digital Signature E-Signing.
Cryptography Science (Digital Signature).
Input Text to be provided and signature required values in the method
these. 
07. Output Step-by-step establishment and verification of digital signatures and message signs
The digital signature.
Digital Signature Learning Schnorr.
Cryptography Science (Digital Signature).
Text Input will be given a signature and the values required in the method
these.
08. Output Step-by-step establishment and verification of digital signatures and message signs
Total Pageviews
Popular Posts
-
Sustainable tourism "Sustainable tourism is envisaged as leading to management of all resources in such a way that economic, social a...
-
Physicists use the scientific method to test the validity of a physical theory, using a methodical approach to compare the implications of t...
-
Most large cities in the United States historically had morning and afternoon newspapers. As the media evolved and news outlets increased t...
-
Throughout his life, Einstein published hundreds of books and articles. Most were about physics, but a few expressed leftist political opini...
-
Harvard's 210-acre (85 ha) main campus is centered on Harvard Yard in Cambridge, approximately 3.4 miles (5.5 km) northwest of downtown ...
-
Einstein visited New York City for the first time on 2 April 1921. When asked where he got his scientific ideas, Einstein explained that he ...
-
Microsoft Corporation is a public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses,...
-
Einstein became an American citizen in 1940. Not long after settling into his career at Princeton, he expressed his appreciation of the ...
-
Computer science or computing science (sometimes abbreviated CS) is the study of the theoretical foundations of information and computation...
-
Throughout his life, Einstein published hundreds of books and articles. Most were about physics, but a few expressed leftist political opini...
You can Find a lot of Tips Here
About Me
Followers
Powered by Blogger.
Blog Archive
-
▼
2010
(121)
-
▼
April
(20)
- Cell Biology
- Biostatistics
- Biochemistry Sience
- Human anatomy
- Types of life insurance
- Life Insurance
- Microsoft history
- Physics Defenition
- What's Electronic
- Hair Treatments
- hotel zaza houston
- Hotel Babylon Series
- Mesothelioma
- What is Forex Trading ?
- Seven star hotels
- Standards of hotel classification
- Mathematics
- LEARNING Cryptography
- PERANGKAT LUNAK PERMAINAN (GAME)
- Referensi Skripsi Teknik Informatika
-
▼
April
(20)



Silahkan Tulis Komentar Anda ...