dc.contributor.advisor |
Tahboub, Radwan |
|
dc.contributor.author |
Ihshish, Bayan |
|
dc.date.accessioned |
2022-03-07T11:59:05Z |
|
dc.date.accessioned |
2022-05-22T07:51:15Z |
|
dc.date.available |
2022-03-07T11:59:05Z |
|
dc.date.available |
2022-05-22T07:51:15Z |
|
dc.date.issued |
2011-12-01 |
|
dc.identifier.uri |
http://localhost:8080/xmlui/handle/123456789/7498 |
|
dc.description |
no of pages 60, 25474, هندسة حاسوب 3/2011 , in the store |
|
dc.description.abstract |
An important element in many computer security services and applications is the use of cryptographic algorithms and tools, this project provides interactive simulator learning environment for cryptography tools and algorithms.
This project gives an overview of cryptographic tools and algorithms, then for each type of tools, introduces, simulates example of the most important standardized algorithms in common use, as data encryption standard (DES) as example of symmetric encryption algorithms, RSA as example of asymmetric encryption algorithms, SHA-1 as example of hash function. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
جامعة بوليتكنك فلسطين - هندسة حاسوب |
en_US |
dc.subject |
Computer security |
en_US |
dc.title |
Computer security algorithm simulator |
en_US |
dc.type |
Other |
en_US |