#TITLE_ALTERNATIVE#
Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used in n...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/11498 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used in network security. One of the applications is election schemes that use network cryptography, especially Blind Signature encryptions. Blind Signature encryption was the most cryptosystem that used in electronic voting because of the security of the system and the easiness of the implementation in a program. This final project contains the application of Blind Signature encryption system in an electronic voting. |
---|