The Application of ElGamal Encryption Technology to the Information Security of Digital Library
نویسنده
چکیده
Nowadays, the construction and application of digital library leads a new era of the way people obtain knowledge and information, and promotes the academic exchanges and social progress. Digital library, however, also involves great risk; hacker attacks become the main threat of the information security of digital library, and may probably cause the loss and damage of the information resources in library. This article mainly introduces the advantages and the potential safety hazard of digital library, and then makes an analysis aiming at the information security of digital library, and finally puts forward an algorithm based on ElGamal encryption to protect library information encryptedly, and effectively guarantee the information security of digital library.
منابع مشابه
A Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map
Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...
متن کاملImage Encryption by Using Combination of DNA Sequence and Lattice Map
In recent years, the advancement of digital technology has led to an increase in data transmission on the Internet. Security of images is one of the biggest concern of many researchers. Therefore, numerous algorithms have been presented for image encryption. An efficient encryption algorithm should have high security and low search time along with high complexity.DNA encryption is one of the fa...
متن کاملبررسی کاربرد فناوری معنایی برای سازماندهی اطلاعات در نرمافزارهای کتابخانه دیجیتالی
The present study was an attempt to investigate the use of semantic technologies to organize information in digital library software systems. The present study was a practical one which employed a descriptive survey method. The study sample consisted of three digital library software systems entitled Pars Azarakhsh, Parvan Pajoh, and Payam Mashregh. Data were collected through a checklist incl...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کامل