Abstract
Data and information transferred through network and Internet are exposed to unauthorized party. Thus, these information are encrypted to cipher text which is meaningless. In the process of encryption, a key is needed to encrypt the plain text to cipher text and vice verse.
Read more (click here)...
No comments:
Post a Comment