41
3
cryptography
In this chapter we present a description and a comparison of
different methods of cryptography: symmetric cryptography,
asymmetric cryptography, digital signature, and digital certifi-
cate. e comparative study of these methods helped us decide
to use the method based on asymmetric cryptography using the
algorithm Rivest–Shamir–Adleman (RSA) (Stallings 1999).
is method has a mode of transmission faster than other algo-
rithms that can be used (MD4, MD5, SHA, and SHA-1).
3.1 Introduction
Cryptography is a method to make information unreadable to ensure
access to a single authenticated recipient (Otto 2004). is approach
ensures the anonymity and the security for confidentiality, authentic-
ity, and integrity of information (Futura- ...