Multiple encryption: Difference between revisions

Content deleted Content added
No edit summary
m Removed unnecessary nowiki from URL to improve accessibility, also moved persistent IDs to proper template. (via WP:JWB)
Line 41:
 
== Examples ==
The figure shows from inside to outside the process of how the encrypted capsule is formed in the context of Echo Protocol, used by the Software Application GoldBug Messenger.<ref>{{cite web |url=http://goldbug.sf.net |title = GoldBug - Secure E-Mail-Client & Instant Messenger}}</ref> GoldBug has implemented a hybrid system for authenticity and confidentiality.<ref name=":0">Adams, David / Maier, Ann-Kathrin (2016): BIG SEVEN Study, open source crypto-messengers to be compared - or: Comprehensive Confidentiality Review & Audit of GoldBug, Encrypting E-Mail-Client & Secure Instant Messenger, Descriptions, tests and analysis reviews of 20 functions of the application GoldBug based on the essential fields and methods of evaluation of the 8 major international audit manuals for IT security investigations including 38 figures and 87 tables., URL: <nowiki>https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf</nowiki> - English / German Language, Version 1.1, 305 pages, June 2016 (ISBN: DNB 110368003X - 2016B14779)</ref>
 
'''<u>First layer of the encryption:</u>'''