Introduction to cryptography, Computer Network Security

INTRODUCTION TO CRYPTOGRAPHY

Cryptography

The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of making and by using codes to secure transmission of the information.

Encryption

Encryption is the procedure of converting an original message into a form which is not readable by unauthorized individuals.

Decryption

Decryption is process of converting cipher text message back into plaintext.

Cryptanalysis

Cryptanalysis is process of obtaining original message from encrypted message without knowing the algorithms and keys used to perform encryption.

Cryptology

Cryptology is science of encryption that combines cryptography and cryptanalysis both

Posted Date: 10/8/2012 7:06:05 AM | Location : United States







Related Discussions:- Introduction to cryptography, Assignment Help, Ask Question on Introduction to cryptography, Get Answer, Expert's Help, Introduction to cryptography Discussions

Write discussion on Introduction to cryptography
Your posts are moderated
Related Questions

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

define .

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.


DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct