The emergence of communication networks, particularly the Internet, has opened new possibilities for information exchange. At the same time, there are increasing threats to the security of information transmitted. It is therefore, necessary to create different mechanisms intended to ensure the confidentiality and authenticity of electronic documents, all part of a new technology called cryptography. It addresses the issue of computer network security, specifically the different variants crypto: symmetrical and asymmetrical. At first glance, it may be said that these are the hardware, software and data (William, 2006). Among them, those most ...