Académique Documents
Professionnel Documents
Culture Documents
DES is symetric encryption algorithem which means that u use the same key to encrypet
and decrypet the message
AES is asymetric encyption algorithem which means :
sender use the public key of the reciever to encrypet the message
reciever use it's private key to decrypt the message
DES was originally designed to run in specialized hardware and is considered
computationally expensive on general-purpose processors. AES was designed to run
efficiently on a variety of processors, including general-purpose ones.
AES is more secure when compared to DES as it uses large blocks for encryption and the
algorithm is relatively complicated than AES. Possible number of AES 128-bit keys are
1021 times greater than DES 56-bit keys, hence it is found that a machine that could
recover a DES key in a second (I.e. try 255keys per second) , it takes 149 trillion years to
crack a 128-bit AES key.
AES is much harder to break than DES but it is need more processing
both needs scheme to distribute keys between sender and reciever
from security point of view both of them are cryptography solutions, that means that they use
encryption as a methos to achive security goals
but from cryptography point of view they differ as one is symetric and the other is asymmetric
Digital Signature
A digital code that can be attached to an electronically transmitted message that uniquely
identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee
that the individual sending the message really is who he or she claims to be. Digital signatures
are especially important for electronic commerce and are a key component of
most authentication schemes. To be effective, digital signatures must be unforgeable.
There are a number of different encryption techniques to guarantee this level of security.
Applications of digital signatures
Digital signatures offer many applications other than signing messages such as e-mail. A
digital signature can be created for any kind of file. The digital signature then can be
used as proof that the file was not modified after the digital signature was created. It
can also be used to make the file unique, for example by appending a serial number to
the file and signing the result.
Where 4a3 + 27b2 0 (this is required to exclude singular curves). The equation above is
what is called Weierstrass normal form for elliptic curves.
NUMBER THEORY, sometimes referred to as higher arithmetic. Number theorists scrutinize the
properties of integers, the natural numbers you know as -1, -2, 0, 1, 2 and so forth. It's part theoretical
and part experimental, as mathematicians seek to discover fascinating and even unexpected
mathematical interactions.
What kind of relationships? Well, we actually categorize integers into different number types based on
their relationships. There are, of course, odd numbers (1,3, 5 ), which cannot be divided evenly,
and even numbers (2, 4, 6 ), which can. There are square numbers, produced by multiplying another
number by itself. For instance, 2 x 2 = 4 and 3 x 3 = 9, so 4 and 9 are both square numbers. So is 1 (1 x 1
= 1) and so is 9,801 (99 x 99 = 9,801). We also express these four examples as 22, 32, 12 and 992.