By selecting the appropriate command, and relies on the fact that the keys can be duplicated, it is possible to reduce the number of exponentiations split by each participant to log_2 (N) + 1 by means of divide and conquer in style, here are the eight participating:Join A, B, C and D each take one instead accepts the g ^ {ABCD}; this value is sent to the E, F, G, and a. in the back, join A, B, C and D receive a g ^ {} efgh.Join A and B each do one instead accepts the g ^ {efghab}, which they sent to C and D, while C and D do the same willing g ^ {} efghcd, where they were sent to A and B.Join the are willing g ^ {efghcda}, which would be sent to B; likewise, B sends a g ^ {} to efghcdb C and d. A. do likewise.Join the action, one of the last to concede a secret agent g. ^ {} = Efghcdba g ^ {} is not the same as abcdefgh B to get the g ^ {} = efghcdab g ^ {abcdefgh}; again, C, and D do likewise.E through H joined together for the same operation by using the g ^ {} ABCD is the beginning of them.When this operation is completed, all participants will have a secret g. ^ {} Abcdefgh, but each participant will have only four more than eight words modular exponentiations by arranging a simple circle.Pretty Good Privacy (PGP) A popular program that is used to encrypt and decrypt (encrypt) (decrypt) the email on the Internet. This program can be used to send digital (digital signature), handwriting, encryption, encrypt the recipient check the sender's identity and that the message has not been changed between the official PGP freeware version is both cheap and in commercial PGP has been widely used as a program to make s/s.Nachai privacy (privacy) by individuals and have been used by many companies, PGP was developed by Philip R. Zimmermann in 1991 laeoklai industry standard for secure email using PGP encrypted files can be stored. Therefore, those files will not be readable by other users and intruders.PGP working? PGP uses public key system variance in this system, the user recognizes the public key and private key encryption, known only to user, you encrypt the messages that you send to someone using their public key. When they are received, they are decoded by using their private key.
การแปล กรุณารอสักครู่..