DEVELOPMENT OF A DIGITAL ENCRYPTION PROGRAM AND IMPLEMENTATION IN PRACTICE |
Автор: Qodirov F. E. |
29.03.2019 10:47 |
УДК 004.7 DEVELOPMENT OF A DIGITAL ENCRYPTION PROGRAM AND IMPLEMENTATION IN PRACTICE Qodirov
Farrux Ergash o’g’li 4th year student Karshi branch of the Tashkent University of
Information Technologies named after Muhammad al-Khorezmi Annotation: It
is noteworthy that the 21st century was the century of information technology.
The emergence of digital integrated circuits allowed us to control devices
using software. In addition, the advent of the discovery of the optical
communication system and the discovery of similar technologies have become one
of the urgent problems in ensuring the data transmission, processing and
security of information technologies and telecommunication systems. What we are
doing in this respect is commendable. Definitely cryptographic! At present, the
“information concept” is often used as a private trademark, which can be
bought, sold, or replaced with another. Keywords: Cryptographic, cybercriminals,
encryption,
algorithm unauthorized. At the same time, the value of information is often multiplied several
hundred thousand times by the cost of its embedded computer system. Therefore,
it is quite natural that there is an urgent need for access to information,
without going into it, deliberately changing, stealing, losing it and avoiding
other types of criminal trafficking. Under the protection of information in computer
systems and networks refers to the use of various tools and measures to ensure
the systematic reliability of the stored, stored and processed information. Let's look at some encryption methods. There are two
modifications for coding the value of the downloaded information: encoding and
encryption. Books or tables containing a set of frequently used expressions are used for encoding. Each of these terms has an optional coded word, often in a set of numbers. Encoding information requires a similar book or table. A coding book or table is an example of an optional cryptographic replacement. Compliance information technology coding - converting lane data into numerical data and making opposite changes. The encryption book can be run on both fast and external storage devices, but such a fast and reliable cryptographic system is not successful. If you use this book without permission, you will need to create a new code and distribute it to all users. ... Полный текст во вложении |
Обновлено 29.03.2019 10:52 |