Cryptography, Other Subject


Information protection uses cryptography to change usable information into a form that renders it ineffectual by anyone other than an official user; this procedure is call encryption. In sequence that has been encrypted (rendered unusable) can be transformed

Back into its unique usable form by an authorized user, who possesses the cryptographic key, from side to side the process of decryption. Cryptography is used in information safety to protect information from illegal or accidental discloser while the information is in transit (either electronically or physically) and at the same time as information is in storage.

Cryptography provides information safety with other practical applications as well including improved authentication message digests, methods, digital signatures, non- refutation, and coded network communications. Older less secure application such as telnet and ftp are slowly being substituted with more secure applications such as ssh that use encrypted network communications. Wireless communications can be coded using the WPA or WEP protocols. Software applications for example GNUPG or PGP can be used to encrypt data files and Email.

Cryptography can bring in security problems when it is not executed properly. Cryptographic clarification need to be implemented using industry accepted solutions that have undergone rigorous peer assessment by independent experts in cryptography. The strength and lenth of the encryption key is also an important thought. A type that is feeble or too short will produce weak encryption. The keys used for decryption and encryption must be protected with the same degree of rigor as any other confidential information. They must be sheltered from illegal disclosure and destruction and they must be obtainable when needed. PKI solutions address many of the troubles that surround key management.

Posted Date: 10/13/2012 2:25:37 AM | Location : United States

Related Discussions:- Cryptography, Assignment Help, Ask Question on Cryptography, Get Answer, Expert's Help, Cryptography Discussions

Write discussion on Cryptography
Your posts are moderated
Related Questions
“The Internet has been linked both to increases and decreases in social capital (Ellison & Steinfield, 2007).” Using examples explain the preceding statement

I was wondering if you give quotes for MCAT tutor help in preparing for the exam? I may need someone from July - August. My exam is scheduled on Sept 7th so I need to be ready and

project help in engineering used in any part of physiology EXAMPLE,Transport in the Kdney,oxygen transport in the lung,bone growth, hemostasis, depolarization / repolarization of

Peer Acceptance refers to the social status or popularity within a large group whereas friendship represents relationships based on mutual respect, appreciation and liking. Peer ac

Advantages of an online library system: I need to prepare a report on Advantages of an online library system. Do you and your experts provide help in topic Advantages of an online

state the relevant provisions of the now moribund 1989 constitution of the federal republic of nigeria

Information and Technology: Information technology (IT) is a term that encompasses all of the forms of technology used to create, exchange, store and use information in its severa

Data security Digital Gold Systems are totally reliant on electronic storage and spread of account possession information. Consequently the security of a given digital currency