Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool

Authors

  • Nurullaev Mirkhon Muhammadovich Department of Information Communication Technology, Bukhara Engineering Technological Institute, Uzbekistan

Keywords:

EDS, cryptographic information security tool, functions of EDS

Abstract

In this article, we will discuss the functions of embedding algorithms for generating and verifying EDS in a cryptographic information security tool. Electronic Data Signatures (EDS) are crucial components of modern cryptographic information security tools. They provide authentication, integrity, and non-repudiation of electronic data, ensuring that the data has not been tampered with during transmission or storage. EDS are generated using a combination of hashing algorithms and digital signatures, which are then embedded into the electronic data.

Downloads

Published

2023-04-17

How to Cite

Nurullaev Mirkhon Muhammadovich. (2023). Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool. Zeta Repository, 17, 51–55. Retrieved from https://zetarepo.com/index.php/zr/article/view/2273

Issue

Section

Articles