Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2015 | 2(11) | 49-62

Article title

Charakterystyka podstawowych statycznych metod szyfrowania informacji

Content

Title variants

Languages of publication

Abstracts

EN
Information protection methods are to ensure the safe operation of data against unauthorized access. The magnitude that characterizes this safe operation of data is called the effectiveness of the applied algorithm. Efficiency is understood as the degree of information protection against infiltration. Unfortunately, all the previous studies and analyzes of individual methods do not take into account the decisive role of man, which has a great influence on the effectiveness of the applied algorithm. The infiltration, or deliberate infiltration of unauthorized persons into the information collection, is divided into accidental and intentional, in turn, we divide into passive and active. For military computer systems one of the ways of infiltration can be described as computer espionage, which is particularly dangerous.

Keywords

Year

Issue

Pages

49-62

Physical description

Dates

published
2015

Contributors

References

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
2158810

YADDA identifier

bwmeta1.element.ojs-issn-1730-0266-year-2015-issue-2_11_-article-5e9c7d80-c470-3512-b4bc-277fc9ee44d1
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.