#TITLE_ALTERNATIVE#
Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is the decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/11360 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
id |
id-itb.:11360 |
---|---|
spelling |
id-itb.:113602017-09-27T11:43:05Z#TITLE_ALTERNATIVE# FERRANDITYA (NIM 10103028), RYAN Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/11360 Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is the decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used in network security. One of the applications is election schemes that use network cryptography, especially homomorphic encryptions. Homomorphic encryptions are more effective and more efficient than other encryptions, because in homomorphic encryption, a message can be operated with another message before encryption, in contrast with other encryption systems. This final project contains the application of El Gamal homomorphic encryption system in an election which involves only 2 candidates. text |
institution |
Institut Teknologi Bandung |
building |
Institut Teknologi Bandung Library |
continent |
Asia |
country |
Indonesia Indonesia |
content_provider |
Institut Teknologi Bandung |
collection |
Digital ITB |
language |
Indonesia |
description |
Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is the decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used in network security. One of the applications is election schemes that use network cryptography, especially homomorphic encryptions. Homomorphic encryptions are more effective and more efficient than other encryptions, because in homomorphic encryption, a message can be operated with another message before encryption, in contrast with other encryption systems. This final project contains the application of El Gamal homomorphic encryption system in an election which involves only 2 candidates. |
format |
Final Project |
author |
FERRANDITYA (NIM 10103028), RYAN |
spellingShingle |
FERRANDITYA (NIM 10103028), RYAN #TITLE_ALTERNATIVE# |
author_facet |
FERRANDITYA (NIM 10103028), RYAN |
author_sort |
FERRANDITYA (NIM 10103028), RYAN |
title |
#TITLE_ALTERNATIVE# |
title_short |
#TITLE_ALTERNATIVE# |
title_full |
#TITLE_ALTERNATIVE# |
title_fullStr |
#TITLE_ALTERNATIVE# |
title_full_unstemmed |
#TITLE_ALTERNATIVE# |
title_sort |
#title_alternative# |
url |
https://digilib.itb.ac.id/gdl/view/11360 |
_version_ |
1820666126481227776 |