Introduction to cryptography, Computer Network Security

INTRODUCTION TO CRYPTOGRAPHY

Cryptography

The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of making and by using codes to secure transmission of the information.

Encryption

Encryption is the procedure of converting an original message into a form which is not readable by unauthorized individuals.

Decryption

Decryption is process of converting cipher text message back into plaintext.

Cryptanalysis

Cryptanalysis is process of obtaining original message from encrypted message without knowing the algorithms and keys used to perform encryption.

Cryptology

Cryptology is science of encryption that combines cryptography and cryptanalysis both

Posted Date: 10/8/2012 7:06:05 AM | Location : United States







Related Discussions:- Introduction to cryptography, Assignment Help, Ask Question on Introduction to cryptography, Get Answer, Expert's Help, Introduction to cryptography Discussions

Write discussion on Introduction to cryptography
Your posts are moderated
Related Questions
i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Ask question #Minimum 100 words acceptwwwed#

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or