1220 Words5 Pages

2. Symmetric encryption: only a single key is used to both encrypt and decrypt a message.

3. Asymmetric encryption: two distinct keys, one public key and one private key are used for encryption and decryption respectively.

4. Hash functions: takes a message of any size and computes a smaller, fixed-size message called a hash. Hash functions are used to provide better performance when signing large blocks of data using asymmetric encryption, to provide integrity, in authentication protocols, and to create pseudorandom data.

The earlier cryptographic algorithms are broken by computers, which can try millions of combinations each second. As computers become more powerful, the cryptographic algorithms are to be designed stronger to keep data secure. Since single key is used for both encryption and decryption, the symmetric cryptosystem requires transferring a secret key to both communication parties before secure communication can begin. The shared secret key between the communication parties is a problem as a secure confidential channel is required. So, this problem of shared key is removed in public key cryptosystem which led us to focus on the asymmetric cryptosystem and its functionality.

2.4 Cryptographic Techniques

The cryptographic techniques are classified into two types;

2.4.1 Symmetric Key Cryptography

The idea behind symmetric encryption is that only a single key is used to both encrypt and decrypt a message. The benefit to using symmetric encryption is that it’s

3. Asymmetric encryption: two distinct keys, one public key and one private key are used for encryption and decryption respectively.

4. Hash functions: takes a message of any size and computes a smaller, fixed-size message called a hash. Hash functions are used to provide better performance when signing large blocks of data using asymmetric encryption, to provide integrity, in authentication protocols, and to create pseudorandom data.

The earlier cryptographic algorithms are broken by computers, which can try millions of combinations each second. As computers become more powerful, the cryptographic algorithms are to be designed stronger to keep data secure. Since single key is used for both encryption and decryption, the symmetric cryptosystem requires transferring a secret key to both communication parties before secure communication can begin. The shared secret key between the communication parties is a problem as a secure confidential channel is required. So, this problem of shared key is removed in public key cryptosystem which led us to focus on the asymmetric cryptosystem and its functionality.

2.4 Cryptographic Techniques

The cryptographic techniques are classified into two types;

2.4.1 Symmetric Key Cryptography

The idea behind symmetric encryption is that only a single key is used to both encrypt and decrypt a message. The benefit to using symmetric encryption is that it’s

Related

## Data Encryption Essay

1023 Words | 5 PagesMissing Chart Encryption Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you

## Use Of Substitution Ciphers And Transposition Ciphers

1348 Words | 6 PagesKaplan University IT286 Unit 6 Jennifer Polisano Question 6-1: Write a one half page description of the use of substitution ciphers and transposition ciphers. Use the rot13 encoding algorithm to encode the following sentence: It is critical for network administrators to understand cryptography. There are several websites that will encrypt in rot13. Answer 6-1: Substitution ciphers are a method of encryption by which units of plaintext are substituted with ciphertext according to a

## Using Encryption Algorithms That Can Be Used For Protecting Data

1403 Words | 6 Pagesstored. However, an important question to ask is how is sensitive or important data being protected. One popular method that is currently used for protecting data is through encryption, which is “the process of converting data to an unrecognizable or ‘encrypted’ form.” 1 This process ensures that only authorized individuals have access to the confidential encrypted message. Encryption can be applied to files, folders, storage devices, or entire volumes. Although encryption can be used to protect a variety

## Annotated Bibliography On Encryption And Cryptography

3972 Words | 16 PagesIntroduction 2 Methods of encryption or cryptography. 2 Symmetric 2 Asymmetric 2 Operation and Working of Both Methods 3 Ingredients of symmetric encryption 3 Working of symmetric cryptography (Graphical Representation) 4 Ingredients of Asymmetric cryptography 4 Working principal of Asymmetric encryption (Graphical representation) 5 Strengths and Weaknesses of Both 6 Strength of Symmetric Encryption 6 Strength of Asymmetric Encryption 6 Weakness of symmetric encryption 6 Weakness of Asymmetric Cryptography

## Cryptography : The Concept Of Public Key Cryptography

2128 Words | 9 PagesAbstract As known today, Cryptography is the transformation of message under the control of secret key and keeping information secure. The first major event in this history was the definition of the concept of public-key cryptography. What we call public key cryptography was the major issue which was presented in 1976.[1] According to the history of cryptography, Diffie Hellman and Merkle Have become famous as cryptographers who explored the concept of public-key cryptography, while Rivest, Shamir

## The History Of Data Encryption Technology Essay

1703 Words | 7 PagesThis paper discusses the history of data encryption technology. It also touches on several aspects of data encryption technology. Furthermore, an attempt will be made to answer several key questions like what is data encryption technology (DET). It will also detail some of the history of DET, how DET affects the lives of people in America, and some of the future implications of this technology. DET can be defined as the translation or changing of information/data into some form of a secret code

## Issc362 Quiz 1 Essay

909 Words | 4 PagesQuestion 1 of 20 | 5.0 Points | Which of the following refers to a piece of code designed to cause harm that is intentionally inserted into a software system and will activate upon the occurrence of some predetermined data, time, or event? | | A.Logic bomb | | | B.Trojan horse | | | C.Cracker | | | D.Denial of service (DoS) attack | | Answer Key: A | | | Question 2 of 20 | 5.0 Points | Denial of service (DoS) and distributed denial of service (DDoS) attacks have the

## Cryptography And The Egyptian Tomb Of A Nobleman

2221 Words | 9 Pagesothers away from things considered important enough. Civilization has a desire to hide this information from others. This could be for reasons of espionage, having a secret that shouldn’t be shared or some other well-guarded right. Cryptography, encryption and various other methods have been used in history and are constantly evolving into what we are using today to protect our data from getting stolen, hacked and lives peeked at. Cryptography, at least in some form, has been around since 1900 BC

## The Cloud Of Cloud Computing

2133 Words | 9 PagesIn current paper we will go through current solution that are used to secure a cloud and get an idea where it is headed. We will start with the basic encryption techniques to complex and understand the infrastructure of who encryption is used to secure the cloud environment. Essential Characteristics of cloud The cloud needs certain sets of characteristics to enable the remote provisioning of scalable and measured resources in an effective

## Cryptography : Using Encryption Decryption Technique

2886 Words | 12 Pagestechniques which we are used getting more complex. Encryption-Decryption technique: Recent cryptography uses mathematical algorithms to design it. This algorithms should design as strong as possible so that it cannot break by any other third party system. The techniques which can be used to do cryptography are microdots, merging words with images and by different symbols. One more way to achieve cryptography by ordinary text into cipher text called as encryption and getting back original information known

### Data Encryption Essay

1023 Words | 5 Pages### Use Of Substitution Ciphers And Transposition Ciphers

1348 Words | 6 Pages### Using Encryption Algorithms That Can Be Used For Protecting Data

1403 Words | 6 Pages### Annotated Bibliography On Encryption And Cryptography

3972 Words | 16 Pages### Cryptography : The Concept Of Public Key Cryptography

2128 Words | 9 Pages### The History Of Data Encryption Technology Essay

1703 Words | 7 Pages### Issc362 Quiz 1 Essay

909 Words | 4 Pages### Cryptography And The Egyptian Tomb Of A Nobleman

2221 Words | 9 Pages### The Cloud Of Cloud Computing

2133 Words | 9 Pages### Cryptography : Using Encryption Decryption Technique

2886 Words | 12 Pages