Introduction to cryptography, Computer Network Security

INTRODUCTION TO CRYPTOGRAPHY

Cryptography

The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of making and by using codes to secure transmission of the information.

Encryption

Encryption is the procedure of converting an original message into a form which is not readable by unauthorized individuals.

Decryption

Decryption is process of converting cipher text message back into plaintext.

Cryptanalysis

Cryptanalysis is process of obtaining original message from encrypted message without knowing the algorithms and keys used to perform encryption.

Cryptology

Cryptology is science of encryption that combines cryptography and cryptanalysis both

Posted Date: 10/8/2012 7:06:05 AM | Location : United States







Related Discussions:- Introduction to cryptography, Assignment Help, Ask Question on Introduction to cryptography, Get Answer, Expert's Help, Introduction to cryptography Discussions

Write discussion on Introduction to cryptography
Your posts are moderated
Related Questions
STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

what is guided media or unguided media