Document Type : Research Paper

Author

Mosul University - College of Computer Science and Mathematics

10.37652/juaps.2012.63375

Abstract

The paper aims at verifying the reliability of the exchanged data and information. The study conducted using the Pretty Good Privacy (PGP) algorithm application within a network of computers. It proposed to provide a method to achieve reliability, using digital signatures and a suitable algorithm for pressing the data before sending it By information security and cryptography, the study assumes the possibility of achieving reliable and confidential information handled electronically. Algorithms using different pressing and digital signatures as well as giving a method for encryption . Enhance reliability algorithm being superior privacy and verification of confidentiality applied. The research has come to several conclusions, most notably: reduction of statistical information limiting the code analyst, reduce the size of the text to speed up the encryption process, access to the highest level of security; and synthesis applied to programs with ready-made structural language adopted in this area

Keywords

Main Subjects

  1. إسماعیل، یاسین حکمت (2004). دراسة الوثوقیة وتحقیقها باستخدام التواقیع الرقمیة .34. رسالة ماجستیر، کلیة علوم الحاسبات والریاضیات , جامعة الموصل.
  2. الحسو، شهد عبد الرحمن (2004). تصمیم نظام هجین بالاعتماد على النصوص.54. رسالة ماجستیر, کلیة علوم الحاسبات والریاضیات, جامعة الموصل.
  3. الحمامی، علاء حسین ومحمد علاء الحمامی (2008). إخفاء المعلومات.18 إثراء للنشر والتوزیع، عمان.
  4. الشاهین، ناهی یوسف وندیم شاهین (2004). دراسة وتصمیم خوارزمیة تشفیر البیانات المنقولة عبر الشبکة. مجلة جامعة دمشق للعلوم الهندسیة، المجلد 20: العدد الثانی.12-22.
  5. حسین، عبد الأمیر خلف(2010). طرق التشفیر للمبتدئین.33. دار وائل للنشر والتوزیع، عمان.
    1. Chandra, P. (2005). Bullet Proof Wireless Security.32 Elsevier Inc.
    2. http://encyclopedia2.thefreedictionary.com/PGP.
    3. Lucas, M. W. (2006). PGP and GPG: Email for the Practical Paranoid.55 Starch Press, July 10,.
    4. Salomon, D. (1998). Data Compression: the Complete Reference.43.Springer-Verlag, New York.
    5. Sayood, Kh. (2006). Introduction to Data Compression. 48. 3rd ed., Elsevier Inc.
    6. Schneier, B. (1996). Applied Cryptography. 23.2nd ed., john Wiley & Sons Inc.
    7. Stalling, W. (1999). Cryptography and Network Security: Principles and Practice,66. 2nd ed., Prentice –Hall, Inc.
    8. Umbaugh, S. E. (1998). Computer Vision and Image.22. Prentice –Hall, Inc,1998.
    9. Processing: A Practical Approach Using CVIP Tools".32Prentice –Hall, Inc,1998.