Cryptographic algorithms-cryptography, Computer Network Security

Cryptographic algorithms

Cryptographic algorithms are broadly classified into two broad categories. They are stated below

1.  Symmetric Encryption and

2.  Asymmetric Encryption

Today’s popular cryptosystems use hybrid combination of symmetric and asymmetric algorithms. Symmetric and asymmetric algorithms were distinguished by the types of keys used for encryption and decryption operations.

Posted Date: 10/9/2012 2:27:30 AM | Location : United States







Related Discussions:- Cryptographic algorithms-cryptography, Assignment Help, Ask Question on Cryptographic algorithms-cryptography, Get Answer, Expert's Help, Cryptographic algorithms-cryptography Discussions

Write discussion on Cryptographic algorithms-cryptography
Your posts are moderated
Related Questions
Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

project on ensuring data securities on cloud computing

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

attacks on crytography


(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

LOCALITY OF REFERENCE PRINCIPLE:  Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows: a) Spatial loca

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t