Group 1: Leo Choi, David St Louis, Nina Undug, Janelle Wiebe & Jamie Wong Many business operations employ public-key cryptography to uphold client privacy rights during the transportation of sensitive data. In public-key cryptography, messages are encrypted using the receiver’s public key, which is publicly available. Consider the following man-in-the-middle attack that may result from …
Category Archives: Uncategorized
Integration of homomorphic encryption to the voting system
Group: Mehedi Hasan, Jagadeesh Somepalli, Prajwal Thippeswamy, Moein Ghavi Introduction Every day, we need to encounter a lot of sensitive and valuable digital data that needs to be encrypted when it is being transmitted from source to destination so that, eavesdroppers can’t extract the information during the transmission. At the same time, we need to …
Continue reading “Integration of homomorphic encryption to the voting system “