National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
The use of cryptographic algorithms and their real use.
Chrstoš, Tomáš ; Holý, Radek (advisor) ; Kaliková, Jana (referee)
The aim of this work is to compare some methods of file encryption. The main goal is to select the most suitable algorithm selected on the basis of their testing and comparing the algorithms. Another goal is to refer about cryptography itself, its history and its development. The theoretical part is first outlined the historical development of cryptography. In addition, this section analyzed and described theoretically selected ciphers, including modern and principles of their functioning. In the practical part, these encryption methods are compared for selected files in their suitability for a particular file type (video data, audio files, documents). These ciphers are tested to encrypt files and decrypt files.
The use of cryptographic algorithms and their real use.
Chrstoš, Tomáš ; Holý, Radek (advisor) ; Kaliková, Jana (referee)
The aim of this work is to compare some methods of file encryption. The main goal is to select the most suitable algorithm selected on the basis of their testing and comparing the algorithms. Another goal is to refer about cryptography itself, its history and its development. The theoretical part is first outlined the historical development of cryptography. In addition, this section analyzed and described theoretically selected ciphers, including modern and principles of their functioning. In the practical part, these encryption methods are compared for selected files in their suitability for a particular file type (video data, audio files, documents). These ciphers are tested to encrypt files and decrypt files.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.