Cryptographic algorithms-cryptography, Computer Network Security

Cryptographic algorithms

Cryptographic algorithms are broadly classified into two broad categories. They are stated below

1.  Symmetric Encryption and

2.  Asymmetric Encryption

Today’s popular cryptosystems use hybrid combination of symmetric and asymmetric algorithms. Symmetric and asymmetric algorithms were distinguished by the types of keys used for encryption and decryption operations.

Posted Date: 10/9/2012 2:27:30 AM | Location : United States







Related Discussions:- Cryptographic algorithms-cryptography, Assignment Help, Ask Question on Cryptographic algorithms-cryptography, Get Answer, Expert's Help, Cryptographic algorithms-cryptography Discussions

Write discussion on Cryptographic algorithms-cryptography
Your posts are moderated
Related Questions

Ask question #Minimum 100 words acceptwwwed#

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

Need Assignemnt help in Information security assignemnt

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI