Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool

dc.contributor.authorNurullaev Mirkhon Muhammadovich
dc.date.accessioned2026-01-02T12:08:38Z
dc.date.issued2023-04-17
dc.description.abstractIn this article, we will discuss the functions of embedding algorithms for generating and verifying EDS in a cryptographic information security tool. Electronic Data Signatures (EDS) are crucial components of modern cryptographic information security tools. They provide authentication, integrity, and non-repudiation of electronic data, ensuring that the data has not been tampered with during transmission or storage. EDS are generated using a combination of hashing algorithms and digital signatures, which are then embedded into the electronic data.
dc.formatapplication/pdf
dc.identifier.urihttps://geniusjournals.org/index.php/ejet/article/view/3918
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/78685
dc.language.isoeng
dc.publisherGenius Journals
dc.relationhttps://geniusjournals.org/index.php/ejet/article/view/3918/3320
dc.rightshttps://creativecommons.org/licenses/by-nc/4.0
dc.sourceEurasian Journal of Engineering and Technology; Vol. 17 (2023): EJET; 51-55
dc.source2795-7640
dc.subjectEDS
dc.subjectcryptographic information security tool
dc.subjectfunctions of EDS
dc.titleEmbedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
muhammadovich_2023_embedding_algorithms_for_generating_and.pdf
item.page.filesection.size
374.05 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections