Proposal to Generate a Various Key from Image for Various Encryption Methods
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2013-01-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdf |