Public-key cryptography

Sort By:
Page 6 of 50 - About 500 essays
  • Good Essays

    encryption of images using magnitude and phase manipulation of the image with the help of a carrier image is described. Although it involves traditional methods like magnitude and phase encryption, the novelty of this work lies in the fact that a private key as well as a carrier image is used for encryption. An image to be encrypted and a carrier image is chosen and row wise one dimensional DFT is taken for both the image. This is used for obtaining the row wise magnitude addition and phase addition which

    • 1975 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Block Chain Essay

    • 1847 Words
    • 8 Pages

    cutting edge applications. In a first part, we present the core concepts. Secondly, we discuss a definition by Vitalik Buterin, the distinction between public and private block chains, and the features of public ledgers. Thirdly, after restating the foundational and disruptive nature of this technology, we present the risks and drawbacks of public distributed ledgers, and show why the latter explain the shift toward hybrid solutions. Finally, we sketch out a list of important applications, bearing

    • 1847 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Preparing a data set for analysis in data mining is a more time consuming task. For preparing a data set it requires more complex SQL quires, joining tables and aggregating columns. Existing SQL aggregations have some limitations to prepare data sets because they return one column per aggregated group. In general, significant manual efforts are required to build data sets, where a horizontal layout is required. Also many data mining applications deal with privacy for many sensitive data. Therefore

    • 1846 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Bitcoin Essay

    • 1856 Words
    • 8 Pages

    Around 1,200 years ago, the pound sterling was created. Serving Great Britain and its territories to this present day, it is one of the most traded currencies in the world. Some 1,000 years later, the dollar came in to existence followed by the Euro at the turn of the millennium. In 2008, a new paradigm, Bitcoin, reared its head into the world economy. Bitcoin sets itself apart from the aforementioned currencies because it doesn’t exist; it is one of many digital currencies, albeit the most popular

    • 1856 Words
    • 8 Pages
    Better Essays
  • Decent Essays

    Ransomware

    • 1301 Words
    • 6 Pages

    user needs to pay a certain amount of money for the files to be decrypted. The operators of CryptoLocker started an online service in November 2013 allowing victims to get buy the key online after the expiry of the deadline (Mark). The victims were required to upload a sample of the infected file and wait for the key to be generated after they paid the ransom. If the deadline had elapsed, then the victim would have to pay more money (Blue). Files that have been encrypted by CryptoLocker

    • 1301 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    while it is in transit (Agrawal & Mishra, 2012). Two popular forms of cryptology are symmetric and asymmetric. Symmetric cryptology-also known as single key encryption-has been in existence for several decades. It is the most widely used. Symmetric encryptions consist of five components: plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. Additionally, in order for the

    • 1414 Words
    • 6 Pages
    Decent Essays
  • Better Essays

    Literature Review on security of Internet of Things Department of Electronics and Telecommunication Engineering, College of Engineering, Pune, India Abstract The concept of the internet of things is that every physical of object in the real world has a virtual component on the internet that can produce and consume services .Such super connected objects would be of great convivences but they would require novel approaches to ensure security and ethical uses. While internet of things is more than

    • 1519 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Data Security in Cloud Computing using RSA Algorithm Abstract: In cloud computing, data security is the major issue. Security in single cloud is less popular than in multicloud due to its ability to reduce security risks. In this paper, we describe a new architecture for security of data storage in multicloud. We use two mechanisms-data encryption and file splitting. When user upload a file ,it is encrypted using AES encryption algorithm. Then that encrypted file is divided into equal parts according

    • 1321 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Taking a Look at Bitcoin

    • 2739 Words
    • 11 Pages

    Introduction I thought of writing a paper on Bitcoin because this is a very interesting topic and everyone tries to get into it, I will try to make this topic understandable by writing it in laymen’s language. Thanks to Professor Dr. Burnham who has given me this opportunity to write a paper on Bitcoin. According to the name of Bitcoin when we first hear this word “Bitcoin” we create image in our mind that there would be some coin kind of thing but there is no coin it is only a digital currency.

    • 2739 Words
    • 11 Pages
    Better Essays
  • Better Essays

    A Proposal on: How to Preserve Privacy and User Control in a world of Big web Data Background to the study Over the past few years, the volume of data collected and stored by business and government organizations has exploded. This data are refer to as “big data”, as it is an evolving term that describes any voluminous amount of structured, semi-structured and unstructured data that has the potential to be mined for information. The big data is a by-product of everyday human activities on the

    • 1551 Words
    • 7 Pages
    Better Essays