#TITLE_ALTERNATIVE#

Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used in n...

Full description

Saved in:
Bibliographic Details
Main Author: RIDWAN ARFANI (NIM 10103068), TAUFIK
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/11498
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:11498
spelling id-itb.:114982017-09-27T11:43:05Z#TITLE_ALTERNATIVE# RIDWAN ARFANI (NIM 10103068), TAUFIK Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/11498 Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used in network security. One of the applications is election schemes that use network cryptography, especially Blind Signature encryptions. Blind Signature encryption was the most cryptosystem that used in electronic voting because of the security of the system and the easiness of the implementation in a program. This final project contains the application of Blind Signature encryption system in an electronic voting. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Cryptography consists of two different processes. The first is the encryption process which is a process to hide a message under a different message. The second is decryption process which is a process to know the true meaning of a hidden message. In modern time, cryptography is frequently used in network security. One of the applications is election schemes that use network cryptography, especially Blind Signature encryptions. Blind Signature encryption was the most cryptosystem that used in electronic voting because of the security of the system and the easiness of the implementation in a program. This final project contains the application of Blind Signature encryption system in an electronic voting.
format Final Project
author RIDWAN ARFANI (NIM 10103068), TAUFIK
spellingShingle RIDWAN ARFANI (NIM 10103068), TAUFIK
#TITLE_ALTERNATIVE#
author_facet RIDWAN ARFANI (NIM 10103068), TAUFIK
author_sort RIDWAN ARFANI (NIM 10103068), TAUFIK
title #TITLE_ALTERNATIVE#
title_short #TITLE_ALTERNATIVE#
title_full #TITLE_ALTERNATIVE#
title_fullStr #TITLE_ALTERNATIVE#
title_full_unstemmed #TITLE_ALTERNATIVE#
title_sort #title_alternative#
url https://digilib.itb.ac.id/gdl/view/11498
_version_ 1820728222870929408