Encryption in general is the process of keeping up the secrecy of data (both fixed and versatile) utilizing programs that can Convert and make an interpretation of that data into codes so that whenever got to by unapproved people doesn't They can comprehend anything since what appears to them is a blend of images, numbers and unlimited characters, the file is encrypted And decryption by password, which must be known to both parties (sender and receiver) This is called With symmetric encryption, Decryption means decryption. The quality and viability of encryption rely upon two key factors: the algorithm, and the key length evaluated by Bit, the higher the bit, the greater the security and difficulty of decrypting. The concept of soft set was studied and applied on the public key cryptography like simple Knapsack and Trapdoor Knapsack ciphers. Significant results were presented that was the measure of the evaluate encryption using the SNR and PSNR.
In this paper, we deal with specific cases in which we can analyze the code of Shimada based on the status of sending the same plaintext from more than one user with different public keys.Wewere able to analyze this codewith the help of the Chinese remainder theorem.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.