Cryptography, Other Subject

Assignment Help:

Cryptography

Information protection uses cryptography to change usable information into a form that renders it ineffectual by anyone other than an official user; this procedure is call encryption. In sequence that has been encrypted (rendered unusable) can be transformed

Back into its unique usable form by an authorized user, who possesses the cryptographic key, from side to side the process of decryption. Cryptography is used in information safety to protect information from illegal or accidental discloser while the information is in transit (either electronically or physically) and at the same time as information is in storage.

Cryptography provides information safety with other practical applications as well including improved authentication message digests, methods, digital signatures, non- refutation, and coded network communications. Older less secure application such as telnet and ftp are slowly being substituted with more secure applications such as ssh that use encrypted network communications. Wireless communications can be coded using the WPA or WEP protocols. Software applications for example GNUPG or PGP can be used to encrypt data files and Email.

Cryptography can bring in security problems when it is not executed properly. Cryptographic clarification need to be implemented using industry accepted solutions that have undergone rigorous peer assessment by independent experts in cryptography. The strength and lenth of the encryption key is also an important thought. A type that is feeble or too short will produce weak encryption. The keys used for decryption and encryption must be protected with the same degree of rigor as any other confidential information. They must be sheltered from illegal disclosure and destruction and they must be obtainable when needed. PKI solutions address many of the troubles that surround key management.


Related Discussions:- Cryptography

Ageing and health, Ageing and Health: Ageing, irreversible biological chan...

Ageing and Health: Ageing, irreversible biological changes that occur in all living things with the passage of time eventually result in death. Although all organisms age, rates o

Discuss cdm, Question 1 The field of environmental finance is a part of...

Question 1 The field of environmental finance is a part of both environmental economics and the conservation movement which develops different financial instruments to protect

Family life education, you being a teacher describe your experience regardi...

you being a teacher describe your experience regarding the role of school parent and peers in imparting family life education.

Library management, What are the aims of personnel planning in libraries? S...

What are the aims of personnel planning in libraries? State the methods and techniques of personnel planning

What is understand by the term social mobility, In traditional societies th...

In traditional societies the social position of an individual is generally ascribed at birth in accordance with law, custom or inherited status. Such systems are characterised by v

Knowledge-Based Decision Support (Intelligent Guidance) Appl, Suggested Pap...

Suggested Paper Outline Organization Description • Overview • Description - Department / Operational Area Studied Detail Definition of Situation / Problem / Opportunity • Backgroun

Symmetric cryptography, Symmetric Cryptography Until recently, symmetri...

Symmetric Cryptography Until recently, symmetric encryption techniques were used to secure information transmitted on public networks. Traditional, symmetric cryptographic syst

How does capitalism lead to alienation, Question : (a) According to Ma...

Question : (a) According to Marxism, how does capitalism lead to alienation? Illustrate your answer by using an example from a specific sector of the Mauritian economy. (b

Save catalogue to file, Implement the save catalogue to file menu option....

Implement the save catalogue to file menu option.  After selecting this option the user should be asked to specify the name of the save file.  All the catalogue data should be st

Basic principles of information security - authenticity, Authenticity I...

Authenticity In computing, e-Business and information security it is essential to make sure that the transaction, communication, data or documents (electronic or physical) are

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd