Introduction to cryptography, Computer Network Security

INTRODUCTION TO CRYPTOGRAPHY

Cryptography

The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of making and by using codes to secure transmission of the information.

Encryption

Encryption is the procedure of converting an original message into a form which is not readable by unauthorized individuals.

Decryption

Decryption is process of converting cipher text message back into plaintext.

Cryptanalysis

Cryptanalysis is process of obtaining original message from encrypted message without knowing the algorithms and keys used to perform encryption.

Cryptology

Cryptology is science of encryption that combines cryptography and cryptanalysis both

Posted Date: 10/8/2012 7:06:05 AM | Location : United States







Related Discussions:- Introduction to cryptography, Assignment Help, Ask Question on Introduction to cryptography, Get Answer, Expert's Help, Introduction to cryptography Discussions

Write discussion on Introduction to cryptography
Your posts are moderated
Related Questions
INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

what is relation ship between computer security goals?


IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

Discuss how developers should apply the following countermeasures to improve the security of their code: