You are on page 1of 2

)(encryption

) (
...
. )
.
. ( . . . .
. .
) (encryption ) .(decryption
)( . . : ) (" "bits
.
.

.
)
.
( - ) ( :


) (packet sniffing . ). (computer hacking .
) (hoaxes .
. . . .
.
.

.
.


:

) (privacy ) (Integrity )peer
.(authentication
)(Privacy

. : )
(passwords ) (firewall ) .(authorization certificates
.
)
. :

(eavesdropping .
)(Integrity
.
.
. .
: ) (message digest ) (encryption
. ) (anti-virus software .

) (backup
. .
.
.
)(Peer Authentication

) ( .
: ) (passwords ) (digital signatures )digital
(certificates . :
) (finger print ..
. . .
) (IBM
.
.
. ) .(Lucifer .

. . .
.
:
/1 )National Institute of
(Standards and Technology- NIST )U.S.
(National Bureau of Standards 1973
) .(Data Encryption Standard- DES
:
. ) (Lucifer algorithm 56 )(bit
. 1976
.

) .(ATM ). (DES
. . ) (RSA ) )
(public key ) ((private key .
. . . )Phil
(Zimmerman 1986 ) (RSA 128
) .(Pretty Good Privacy- PGP
.
/2 id Quantique
.
.
. .

You might also like