La sécurité des échanges e-mail en utilisant des algorithmes hybrides
dc.contributor.author | Boutarfa, Walida | |
dc.contributor.author | Baaziz, Mohammed Lamine | |
dc.date.accessioned | 2018-12-04T05:47:29Z | |
dc.date.available | 2018-12-04T05:47:29Z | |
dc.date.issued | 2012 | |
dc.description.abstract | A key security solution is that cryptography is the study of methods for transmitting data confidentially. To protect a message, we apply a transformation that makes it incompréhensible. There are three cryptographie primitives; keyless Primitive, symmetric primitive key and public key primitive each team has différent branches. We are interested in the public key primitive, it relies on the use of a distributed key and another key remains secret. Among the algorithms of cryptography the most used one is the RSA (Rivest Shamir Adleman). To this end, we will implement an application to exchange e-mails using the advantage of RSA and symmetric key algorithm, implementing a hybrid algorithm for it and improve safety performance. | ar |
dc.identifier.uri | http://hdl.handle.net/123456789/6787 | |
dc.language.iso | fr | ar |
dc.publisher | Université Oum El Bouaghi | ar |
dc.subject | Cryptologie | ar |
dc.subject | Algorithme hybride | ar |
dc.subject | Protection information : sécurité réseau : e-mail | ar |
dc.title | La sécurité des échanges e-mail en utilisant des algorithmes hybrides | ar |
dc.type | Other | ar |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Master 2 (sécurité des échanges des E-mails en utilisant des algos hybrides).pdf
- Size:
- 1.15 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: