Google

CONTENTS

TITTLE

ABSTRACT

ACKNOWLEDGMENTS

CHAPTER I -INTRODUCTION

I.1 INTRODUCTION
I.2 BUGS PROJECT

CHAPTER II -CRYPTOGRAPHY-

II.1 INTRODUCTION
II.2 DEFINITIONS

II.2.1 Terminology
II.2.2 Algorithms

II.2.2.1 Private key algorithm
II.2.2.2 Public key algorithm

II.3 CRYPTOGRAPHY STANDARDS

II.3.1 Introduction
II.3.2 DES
II.3.3 RSA
II.3.4 Conclusion

II.4 POSSIBLE APPLICATIONS

II.4.1 Introduction
II.4.2 Login password
II.4.3 PGP
II.4.4 Conclusion

II.5 COMMON CRYPTOGRAPHY ATTACKS

II.5.1 Introduction
II.5.2 Algorithm attacks
II.5.3 Brute force attack

II.6 LAWS IN DIFFERENT COUNTRIES

II.6.1 Introduction
II.6.2 The United States
II.6.3 France
II.6.4 The United Kingdom
II.6.5 Conclusion

II.7 CONCLUSION