CONTENTS
TITTLE
ABSTRACT
ACKNOWLEDGMENTS
CHAPTER I -INTRODUCTION
I.1 INTRODUCTION
I.2 BUGS PROJECT
CHAPTER II -CRYPTOGRAPHY-
II.1 INTRODUCTION
II.2 DEFINITIONS
II.2.1 Terminology
II.2.2 Algorithms
II.2.2.1 Private key algorithm
II.2.2.2 Public key algorithm
II.3 CRYPTOGRAPHY STANDARDS
II.3.1 Introduction
II.3.2 DES
II.3.3 RSA
II.3.4 Conclusion
II.4 POSSIBLE APPLICATIONS
II.4.1 Introduction
II.4.2 Login password
II.4.3 PGP
II.4.4 Conclusion
II.5 COMMON CRYPTOGRAPHY ATTACKS
II.5.1 Introduction
II.5.2 Algorithm attacks
II.5.3 Brute force attack
II.6 LAWS IN DIFFERENT COUNTRIES
II.6.1 Introduction
II.6.2 The United States
II.6.3 France
II.6.4 The United Kingdom
II.6.5 Conclusion
II.7 CONCLUSION