Cryptography, Other Subject

Cryptography

Information protection uses cryptography to change usable information into a form that renders it ineffectual by anyone other than an official user; this procedure is call encryption. In sequence that has been encrypted (rendered unusable) can be transformed

Back into its unique usable form by an authorized user, who possesses the cryptographic key, from side to side the process of decryption. Cryptography is used in information safety to protect information from illegal or accidental discloser while the information is in transit (either electronically or physically) and at the same time as information is in storage.

Cryptography provides information safety with other practical applications as well including improved authentication message digests, methods, digital signatures, non- refutation, and coded network communications. Older less secure application such as telnet and ftp are slowly being substituted with more secure applications such as ssh that use encrypted network communications. Wireless communications can be coded using the WPA or WEP protocols. Software applications for example GNUPG or PGP can be used to encrypt data files and Email.

Cryptography can bring in security problems when it is not executed properly. Cryptographic clarification need to be implemented using industry accepted solutions that have undergone rigorous peer assessment by independent experts in cryptography. The strength and lenth of the encryption key is also an important thought. A type that is feeble or too short will produce weak encryption. The keys used for decryption and encryption must be protected with the same degree of rigor as any other confidential information. They must be sheltered from illegal disclosure and destruction and they must be obtainable when needed. PKI solutions address many of the troubles that surround key management.

Posted Date: 10/13/2012 2:25:37 AM | Location : United States







Related Discussions:- Cryptography, Assignment Help, Ask Question on Cryptography, Get Answer, Expert's Help, Cryptography Discussions

Write discussion on Cryptography
Your posts are moderated
Related Questions
On their farm, the Friendly family grows apples that they harvest each fall and make into three products apple butter, applesauce, and apple jelly. They sell these three items at s

what happens during honeymoon?

Question: (a) Show ego-defense mechanisms giving a real life example for each. (b) What are the basic concepts of reality therapy? (c) Using real life illustrations, ho

Question 1 Write a long note on Environmental Protection in the Constitution Question 2 Write a long note on financial relations between the Centre and the States Q

1) Describe Symbolic Interaction Theory. Explain and discuss how it views a) religion, b) politics/economics, and c) medicine. 2) Describe Structural Functionalist Theory. Expla

Encryption in Digital Signatures Digital Certificates Work In physical transactions, the challenges of authentication, identification and privacy are solved with physical

Mass Communication: "Mass communication refers to the procedure by which we communicate along with a large group of people via mass media" In the mass communication situation, the

The mouth is the beginning of the digestive tract; and, in fact, digestion starts here when taking the first bite of food. Chewing breaks the food into pieces that are more easily

Roman History: It spans a thousand years and covers not only the Mediterranean region, but Europe to the British is less, northeast to the Danube River, and eastward through Asia

Non-Repudiation In law, non-repudiation involves one's purpose to fulfill their responsibilities to a contract. It also implies that one party of a transaction cannot reject ha