Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

University for Business and Technology in Kosovo

Encryption

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli Oct 2021

Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli

UBT International Conference

This paper first of all reflects the need for encryption and then the importance it has managed to accumulate over thousands of years of use. Various factors, mainly of a purpose; being powerful, have influenced the rapid development and stressed the importance of encryption in governing bodies.

Depending on in which part of the world it is used and for what reasons it is developed, the importance of cryptography in different governments has shifted to the more powerful states.

Governments have encountered conflicts due to the popularization of encryption, where users of encryption belonging to the non-governmental communities have declined …


Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani Oct 2020

Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani

UBT International Conference

The rapid developments of technology which have brought with them a host of benefits to humanity have also left behind a host of spaces which have mostly aided cyber piracy who exploit the many benefits of the internet for purposes that are in their favor,but these actions which negatively affect the privacy of all internet users. In this project I will present some modifications which are enabled through the 16x16 square of Dionis with 256 elements based in the Masonic Cipher method, with the help of which based on the rules I have created and developed it is different from …


Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo Oct 2018

Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo

UBT International Conference

There are so many applications and data that flow during our daily activities, either personal or institutional ones. Also the companies and business do transactions or their real operations through the Web and other Internet facilities. Security breaches are costing individuals or companies millions so information security has to be a major priority. There are several forms of security technology available, but encryption is one that everyday computer users should know about. Encryption and the performance of cryptographic algorithms are variable according to implemented platforms, software and hardware components or application scenarios. According to specific security metrics and requirements we …


Using Congruence In Encoding Musical Partituras, Besim Shala, Besiana Mehmedi, Shkodran Tolaj, Azir Jusufi Nov 2014

Using Congruence In Encoding Musical Partituras, Besim Shala, Besiana Mehmedi, Shkodran Tolaj, Azir Jusufi

UBT International Conference

Along with theoretical review of partituras and encryption systems, we have tried to conduct encryption of sheets by encoding all of its elements such as: encoding musical notes, encoding values of notes and intermissions, encoding accords, encoding tonalities and encoding rhythm whereby the original musical piece is transformed into an irregular and meaningless sheet. Information technology today has allowed for easier copying of authorial pieces; therefore, it is necessary to know encryption which allows protection of pieces from any misuse. Cryptology including knowledge of congruence deals with resolution of these insecurities. The significance of this paper lies in intertwining knowledge …