Abstrakt: |
For the hijacking of confidential data from computer users who want to give me some information about the safety of their own information, the vicious hand, and the vicious news program. One of these concerns є realizing encryptionis more than necessary for the additional protection of digital signatures before atribute. For cryptosystem robots, encryption with a secure key requires three algorithms: the encryption algorithm, the encryption algorithm, and the key generation algorithm. One of the promising ways to develop encryption with advanced keys is to choose a model for a high degree of discrete logarithms for generating keys, so the Diffie-Hellman algorithm ranks. The spectrum of possible cyber attacks is analyzed, the specifics of their implementation, those are straightforward, the theoretical aspects of the protocol are exchanged with the exchange of Diffie-Hellman keys, the implementation of the protocol is tested, and the protocol is analyzed. [ABSTRACT FROM AUTHOR] |