Annotated Bibliography On Cryptography And Presence Of Potential Adversaries Essay

3618 WordsAug 11, 201515 Pages
Cryptography The practice and study in securing communication between parties in presence of potential adversaries. A cryptographic algorithm or cipher is a mathematical function used in a plaintext in the encryption and decryption process. A cryptographic algorithm works in combination with a key (number, word, or phrase) to encrypt the plaintext. The same plaintext also encrypts to different cipher text with the use of different keys. The core of modern cryptography is the construction and analyzation of protocols of various aspects in information security such as data integrity and confidentiality, authentication, and non-repudiation. Modern practice of cryptography involves cryptographic method. First cryptographic method is the Symmetric-Key Algorithm also known as Secret key Cryptography. The symmetry of algorithm comes from both parties involved sharing the same key for both data encryption and decryption. It works like a physical door where anyone who has the right locking and unlocking uses a copy of the same key. Symmetric-key Algorithm works by taking the message and combining it with a shared key that inputs the algorithm then outputs a ciphered message. Two ways of symmetric-key algorithm encryption involve block ciphers and stream ciphers. Stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In astream cipher each plaintext digit is encrypted one at a time with the corresponding

More about Annotated Bibliography On Cryptography And Presence Of Potential Adversaries Essay

Open Document