pThe aim of this research is to build a ciphering system by using genetic neural network technique to protect data against unauthorized access to the data being transferred./ppThe encryption data includes three stages: first Stage :- Using the genetic algorithm to train backpropagation neural ...
The subject of the invention is a system for enciphering and deciphering information, of the type using a public key enciphering system. The system is composed of at least one electronic device 1 advantageously mounted on a removable portable support C1 such as a card, and of an apparatus A1...
In the memory M1 is recorded an algorithm corresponding to the secret function of a public key function of the RSA type, and in the memory M2 is recorded the secret key S enabling this algorithm to be executed. The invention applies in particular to the transmission of signed messages. ...
In the memory M1 is recorded an algorithm corresponding to the secret function of a public key function of the RSA type, and in the memory M2 is recorded the secret key S enabling this algorithm to be executed. The invention applies in particular to the transmission of signed messages. ...
In this case, a decoding code having an algorithm adverse to the encipherement is used when the information is read out of the part 2 since the information recorded at the part 2 is enciphered. Thus the security is improved for the application of a recording medium.NAITO MASASHI...