Introduction to cryptography, Computer Network Security

INTRODUCTION TO CRYPTOGRAPHY

Cryptography

The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of making and by using codes to secure transmission of the information.

Encryption

Encryption is the procedure of converting an original message into a form which is not readable by unauthorized individuals.

Decryption

Decryption is process of converting cipher text message back into plaintext.

Cryptanalysis

Cryptanalysis is process of obtaining original message from encrypted message without knowing the algorithms and keys used to perform encryption.

Cryptology

Cryptology is science of encryption that combines cryptography and cryptanalysis both

Posted Date: 10/8/2012 7:06:05 AM | Location : United States







Related Discussions:- Introduction to cryptography, Assignment Help, Ask Question on Introduction to cryptography, Get Answer, Expert's Help, Introduction to cryptography Discussions

Write discussion on Introduction to cryptography
Your posts are moderated
Related Questions
Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P