Abstract
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies the functionality of TORDES for encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure.
The article was added to IASJ on 2012-12-09
632 Total full text downloads since the date of addition
Year |
Total |
Jan |
Feb |
Mar |
Apr |
May |
Jun |
Jul |
Aug |
Sep |
Oct |
Nov |
Dec |
2024 |
9 |
3 |
6 |
|
|
|
|
|
|
|
|
|
|
2023 |
38 |
1 |
|
|
2 |
2 |
2 |
4 |
6 |
5 |
5 |
5 |
6 |
2022 |
44 |
8 |
3 |
2 |
6 |
1 |
4 |
6 |
5 |
5 |
|
4 |
|
2021 |
36 |
4 |
5 |
|
|
9 |
6 |
3 |
|
|
3 |
2 |
4 |
2020 |
28 |
4 |
6 |
1 |
2 |
2 |
2 |
1 |
2 |
3 |
|
4 |
1 |
2019 |
31 |
3 |
1 |
1 |
|
1 |
6 |
4 |
1 |
2 |
4 |
2 |
6 |
2018 |
16 |
|
|
|
|
|
2 |
|
2 |
2 |
|
4 |
6 |
2017 |
34 |
2 |
|
8 |
2 |
5 |
1 |
3 |
5 |
1 |
2 |
1 |
4 |
2016 |
48 |
|
|
3 |
7 |
1 |
4 |
6 |
13 |
4 |
4 |
4 |
2 |
2015 |
92 |
7 |
14 |
9 |
10 |
6 |
17 |
2 |
2 |
9 |
9 |
5 |
2 |
2014 |
125 |
5 |
11 |
16 |
16 |
6 |
15 |
10 |
3 |
17 |
13 |
6 |
7 |
2013 |
120 |
18 |
7 |
11 |
10 |
7 |
6 |
18 |
23 |
13 |
3 |
2 |
2 |
2012 |
11 |
|
|
|
|
|
|
|
|
|
|
|
11 |
Usage is updated on a monthly basis.