Cryptographic algorithms-cryptography, Computer Network Security

Cryptographic algorithms

Cryptographic algorithms are broadly classified into two broad categories. They are stated below

1.  Symmetric Encryption and

2.  Asymmetric Encryption

Today’s popular cryptosystems use hybrid combination of symmetric and asymmetric algorithms. Symmetric and asymmetric algorithms were distinguished by the types of keys used for encryption and decryption operations.

Posted Date: 10/9/2012 2:27:30 AM | Location : United States







Related Discussions:- Cryptographic algorithms-cryptography, Assignment Help, Ask Question on Cryptographic algorithms-cryptography, Get Answer, Expert's Help, Cryptographic algorithms-cryptography Discussions

Write discussion on Cryptographic algorithms-cryptography
Your posts are moderated
Related Questions
LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n