This preview shows page 1. Sign up to view the full content.
Unformatted text preview: protocols for email, file exchange, etc. Provide a numerical example of encryption and decryption following this algorithm briefly explaining each step. Make sure to reference your sources (i.e. by providing URL addresses, etc.)....
View Full Document
This note was uploaded on 06/10/2011 for the course AEP 3630 taught by Professor Bozarov during the Spring '08 term at Cornell.
- Spring '08