![]() ![]() In another experiment conducted tests with models such as the ciphertext only attack, know-plain attack and brute force attack to determine the strength of the ElGamal algorithm from those kind of attack models.Based on the results of testing that has been done can be concluded that the ElGamal algorithm is very good to solve the problem of key distribution management. In the application program the process of making key be done, encryption and decryption of a message so the key management measures and outcomes that occur in the process of encryption and decryption with ElGamal algorithm can be known. This key can only be accessed by the intended recipient. This key is publicly accessible.The private key is used to decrypt messages on the message read. ![]() The public key is used to encrypt messages in the process of writing a message. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |