Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 12, Problem 15RQ
Program Plan Intro

Cryptology:

  • Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms.
  • It is formed from the Greek words “kryptos” (that is hidden) and “logos” (that is word).
  • It achieves security from appropriate users being able to transform information by asset of a secret keys.

Blurred answer
Students have asked these similar questions
What is the goal of cryptography?
What are the three essential operations involved in cryptography?
What are cryptography's three fundamental operations?
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning