A Synopsis of Pure and Applied Cryptography
Maher Rusho ()
International Journal of Sciences, 2022, vol. 11, issue 06, 1-4
Abstract:
The literature of cryptography has a curious story. Secracy, of course, played a central role, but until the first World war, important developments appeared in print in a more or less timely fashion. After the first world war, however things began to change .US. Army and Navy organizations working entirely in secret. In the “imitation Game “ we see that Allen turing build a machine called “The Enigma Machine “. And using statistical method he inspired to win The world war . This was an extraordinary example of the application of mathematics to see how math works in every section of life. I am going to write a series of paper of cryptology for everyone. It will be a good reading for anyone interest in cryptology and want to know more!!
Keywords: Encryption; Decryption; Plain Text; Cypher-Text Symmetric Algorithm; Public-Key Algorithm; Known Plain -Text Attack; Rubber-Hose Cryptoanalysis; Chosen Cyper-Text Attack; Security Of Algorithms; Steganography (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.ijsciences.com/pub/article/2593 (text/html)
https://www.ijsciences.com/pub/pdf/V112022062593.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:adm:journl:v:11:y:2022:i:6:p:1-4
Ordering information: This journal article can be ordered from
https://www.ijsciences.com/payment_guide.php
DOI: 10.18483/ijSci.2593
Access Statistics for this article
More articles in International Journal of Sciences from Office ijSciences Alkhaer Publications Manchester M8 8XG England.
Bibliographic data for series maintained by Staff ijSciences ().