1220 Words5 Pages

2. Symmetric encryption: only a single key is used to both encrypt and decrypt a message.
3. Asymmetric encryption: two distinct keys, one public key and one private key are used for encryption and decryption respectively.
4. Hash functions: takes a message of any size and computes a smaller, fixed-size message called a hash. Hash functions are used to provide better performance when signing large blocks of data using asymmetric encryption, to provide integrity, in authentication protocols, and to create pseudorandom data.
The earlier cryptographic algorithms are broken by computers, which can try millions of combinations each second. As computers become more powerful, the cryptographic algorithms are to be designed stronger to keep data secure. Since single key is used for both encryption and decryption, the symmetric cryptosystem requires transferring a secret key to both communication parties before secure communication can begin. The shared secret key between the communication parties is a problem as a secure confidential channel is required. So, this problem of shared key is removed in public key cryptosystem which led us to focus on the asymmetric cryptosystem and its functionality.
2.4 Cryptographic Techniques
The cryptographic techniques are classified into two types;
2.4.1 Symmetric Key Cryptography
The idea behind symmetric encryption is that only a single key is used to both encrypt and decrypt a message. The benefit to using symmetric encryption is that it’s

Related

## Data Encryption Essay

1023 Words | 5 PagesMissing Chart Encryption Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you

## Use Of Substitution Ciphers And Transposition Ciphers

1348 Words | 6 PagesKaplan University IT286 Unit 6 Jennifer Polisano Question 6-1: Write a one half page description of the use of substitution ciphers and transposition ciphers. Use the rot13 encoding algorithm to encode the following sentence: It is critical for network administrators to understand cryptography. There are several websites that will encrypt in rot13. Answer 6-1: Substitution ciphers are a method of encryption by which units of plaintext are substituted with ciphertext according

## Data Encryption Essay

781 Words | 4 PagesEncryption Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for

## Using Encryption Algorithms That Can Be Used For Protecting Data

1403 Words | 6 Pagesstored. However, an important question to ask is how is sensitive or important data being protected. One popular method that is currently used for protecting data is through encryption, which is “the process of converting data to an unrecognizable or ‘encrypted’ form.” 1 This process ensures that only authorized individuals have access to the confidential encrypted message. Encryption can be applied to files, folders, storage devices, or entire volumes. Although encryption can be used to protect a variety

## Why Symmetric Key Cryptography Alone Can Not Resolve Internet Security Issue?

1480 Words | 6 Pages1) Discussion board I. Why symmetric key cryptography alone cannot resolve Internet security issue? Ans: Symmetric encryption,although fast, suffers from several problems in the modern digital communication environment including The biggest problem is that of a single key that must be shared in pairs of each sender and receiver. In a distributed environment with large numbers of combination pairs involved in many-to-one communication topology, it is difficult for the one recipient to keep so many

## Annotated Bibliography On Encryption And Cryptography

3972 Words | 16 PagesIntroduction 2 Methods of encryption or cryptography. 2 Symmetric 2 Asymmetric 2 Operation and Working of Both Methods 3 Ingredients of symmetric encryption 3 Working of symmetric cryptography (Graphical Representation) 4 Ingredients of Asymmetric cryptography 4 Working principal of Asymmetric encryption (Graphical representation) 5 Strengths and Weaknesses of Both 6 Strength of Symmetric Encryption 6 Strength of Asymmetric Encryption 6 Weakness of symmetric encryption 6 Weakness of Asymmetric Cryptography

## Essay On Ssl

1960 Words | 8 Pageskey to decrypt and obtain the session key. After this point both sides have a session key which is only known to those two, and this then enables the communications between browser and server to be encrypted. This therefore ensures that there is no breach of availability, as the user does not physically see this process and would be able to access the desired information if authorized. A breach of integrity is when the authenticity of the information being presented is called into question, and the

## The History Of Data Encryption Technology Essay

1703 Words | 7 PagesThis paper discusses the history of data encryption technology. It also touches on several aspects of data encryption technology. Furthermore, an attempt will be made to answer several key questions like what is data encryption technology (DET). It will also detail some of the history of DET, how DET affects the lives of people in America, and some of the future implications of this technology. DET can be defined as the translation or changing of information/data into some form of a secret

## Cryptography : The Concept Of Public Key Cryptography

2128 Words | 9 PagesAbstract As known today, Cryptography is the transformation of message under the control of secret key and keeping information secure. The first major event in this history was the definition of the concept of public-key cryptography. What we call public key cryptography was the major issue which was presented in 1976.[1] According to the history of cryptography, Diffie Hellman and Merkle Have become famous as cryptographers who explored the concept of public-key cryptography, while Rivest, Shamir

## Issc362 Quiz 1 Essay

909 Words | 4 PagesQuestion 1 of 20 | 5.0 Points | Which of the following refers to a piece of code designed to cause harm that is intentionally inserted into a software system and will activate upon the occurrence of some predetermined data, time, or event? | | A.Logic bomb | | | B.Trojan horse | | | C.Cracker | | | D.Denial of service (DoS) attack | | Answer Key: A | | | Question 2 of 20 | 5.0 Points | Denial of service (DoS) and distributed denial of service (DDoS) attacks have the

### Data Encryption Essay

1023 Words | 5 Pages### Use Of Substitution Ciphers And Transposition Ciphers

1348 Words | 6 Pages### Data Encryption Essay

781 Words | 4 Pages### Using Encryption Algorithms That Can Be Used For Protecting Data

1403 Words | 6 Pages### Why Symmetric Key Cryptography Alone Can Not Resolve Internet Security Issue?

1480 Words | 6 Pages### Annotated Bibliography On Encryption And Cryptography

3972 Words | 16 Pages### Essay On Ssl

1960 Words | 8 Pages### The History Of Data Encryption Technology Essay

1703 Words | 7 Pages### Cryptography : The Concept Of Public Key Cryptography

2128 Words | 9 Pages### Issc362 Quiz 1 Essay

909 Words | 4 Pages