Authorisation
Data transfer security maintenance based on “Rd Crypto Messenger” sample
Author: Giorgi IashviliCo-authors: Giorgi Iashvili
Keywords: data, security
Annotation:
Have you heard about “hackers” who have hacked some systems and stole thousand gigabytes of data? What will be your reaction, when you hear that someone has all information about your bank account and he is able to manage it without you? This master degree final project examines data security and it’s maintenance. There are lots of ways to hack data, so there are lots of ways to protect them. It is recommended to use the following strategies to secure your data: Certificate Authority, Digital Signature, MD5 Hash Algorithm, DES Algorithm and etc. In case of certificate existence you are guaranteed that the data will be transferred encrypted and safely without knowing from anyone. Digital signing confirms that you are the original author of the data you are sending to someone. MD5 hash algorithm is used to hash your data to keep it unknown from anyone and send it without showing it’s contents. DES algorithm is a symmetric-key algorithm for the encryption of electronic data, which can encrypt and decrypt the data using the same key. Using these and many other strategies and algorithms you can keep your data secured, which is desired achievement for everyone.