Главное меню

Реклама

DEVELOPMENT OF A DIGITAL ENCRYPTION PROGRAM AND IMPLEMENTATION IN PRACTICE PDF Печать E-mail
Автор: Qodirov F. E.   
29.03.2019 05:47

УДК 004.7

DEVELOPMENT OF A DIGITAL ENCRYPTION PROGRAM AND IMPLEMENTATION IN PRACTICE


Qodirov Farrux Ergash o’g’li 4th year student

Karshi branch of the Tashkent University of Information Technologies

named after Muhammad al-Khorezmi


Annotation: It is noteworthy that the 21st century was the century of information technology. The emergence of digital integrated circuits allowed us to control devices using software. In addition, the advent of the discovery of the optical communication system and the discovery of similar technologies have become one of the urgent problems in ensuring the data transmission, processing and security of information technologies and telecommunication systems. What we are doing in this respect is commendable. Definitely cryptographic! At present, the “information concept” is often used as a private trademark, which can be bought, sold, or replaced with another.

Keywords: Cryptographic, cybercriminals, encryption, algorithm unauthorized.

 At the same time, the value of information is often multiplied several hundred thousand times by the cost of its embedded computer system. Therefore, it is quite natural that there is an urgent need for access to information, without going into it, deliberately changing, stealing, losing it and avoiding other types of criminal trafficking.

Under the protection of information in computer systems and networks refers to the use of various tools and measures to ensure the systematic reliability of the stored, stored and processed information.

Let's look at some encryption methods. There are two modifications for coding the value of the downloaded information: encoding and encryption.

Books or tables containing a set of frequently used expressions are used for encoding. Each of these terms has an optional coded word, often in a set of numbers. Encoding information requires a similar book or table. A coding book or table is an example of an optional cryptographic replacement. Compliance information technology coding - converting lane data into numerical data and making opposite changes. The encryption book can be run on both fast and external storage devices, but such a fast and reliable cryptographic system is not successful. If you use this book without permission, you will need to create a new code and distribute it to all users.

...

Полный текст во вложении


Вложения:
Скачать файл (VIII_Фаррух_Статья .pdf)VIII_Фаррух_Статья .pdf[ ]147 Kb
Обновлено 29.03.2019 05:52
 
Яндекс.Метрика