1 research outputs found

    Data Reduction by Huffman Coding and Encryption by Insertion of Shuffled Cyclic Redundancy Code

    Get PDF
    Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. It uses mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. The encryption here mainly of two types. They are private and public key cryptography
    corecore