Application of Factorial and Binomial identities in Cybersecurity
DOI:
https://doi.org/10.31224/2355Keywords:
cybersecurityAbstract
This paper focuses on the application of factorial and binomial identities in cybersecurity in connection with the symmetric and asymmetric encryptions. We can use the binomial identities and theorem in factorials as an effective security algorithm to protect the computing systems, programs, and networks.
Downloads
Download data is not yet available.
Downloads
Posted
2022-05-18
License
Copyright (c) 2022 Chinnaraji Annamalai
This work is licensed under a Creative Commons Attribution 4.0 International License.