Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Data Structure Articles - Page 97 of 173
4K+ Views
A true random number generator (TRNG) uses a nondeterministic source to make randomness. Most function by measuring unpredictable natural processes, including pulse detectors of ionizing radiation activities, gas discharge tubes, and leaky capacitors.Intel has developed a commercially accessible chip that samples thermal noise by developing the voltage measured across undriven resistors. TRNG generates a true random number and is produced generally by hardware method.Because the random number produced by TRNG is complex to predict because TRNG is generated based on a physical source that is complex to forecast a random value. Hence, the random number produced from TRNG is a ... Read More
3K+ Views
A symmetric cipher is one that uses the similar key for encryption and decryption. The use of a symmetric cipher presents the well-known challenge of how to share the secret key between the parties fast, as an unauthorized party to the communication can prevent it and eavesdrop on future communication.There are various principles of Symmetric Cipher which are as follows −Plaintext − This is the authentic intelligible message or information that is full into the algorithm as input.Encryption algorithm − The encryption algorithm implements several substitutions and conversion on the plaintext.Secret key − The secret key is also input to ... Read More
646 Views
AuthenticationAuthentication is the procedure of providing that an individual is the person that they claim to be. This contains matching a person’s claimed identity asserted through a credential (such as an ID card or unique ID number) against one or more authentication factors that are destined to that credential.Authentication is about validating the credentials such as User Name/User ID and password to verify the identity. The system decides whether it can what it can say and it is using the credentials.In public and private networks, the system authenticates the user identity through login passwords. Authentication is usually completed by a ... Read More
4K+ Views
Authorization is the procedure of permitting someone to do something. It defines it an approach to check if the user has permission to need a resource or not. It can represent that what data and information one user can access.It is also called as AuthZ. The authorization generally works with authentication so that the system can understand who is accessing the information. Authorization is a security structure used to decide user/client privileges or access levels associated with system resources, such as computer programs, files, services, data and application features.Authorization is generally preceded by authentication for customer identity verification. System administrators ... Read More
432 Views
There are various types of cryptosystem which are as follows −Private Key cryptosystems − Symmetric encryption is also known as private-key encryption or secret-key encryption. It contains using the similar key for encryption and decryption. Encryption contains using an operation (an algorithm) to the data to be encrypted using the private key to create them meaningless.The main disadvantage of a secret-key cryptosystem is associated to the exchange of keys. Symmetric encryption depends on the swap of a secret (keys).Public-key cryptosystems − Public-key cryptosystems is also known as asymmetric cryptography. It is a type of cryptographic algorithms which needed two separate ... Read More
1K+ Views
Authentication is the procedure which enables a sender and receiver of data to certify each other. If the sender and receiver of data cannot properly authenticate each other, there is no trust in the activities or data supported by either party.Authentication can include largely difficult and secure approach or can be very simple. The easiest form of authentication is the transmission of a shared password among entities wanting to authenticate each other.Authentication defines allowing the network to only receive the authorized users to have access to its resources. It provides the method where the claimed identifier is tested by the ... Read More
1K+ Views
Authentication is the procedure of checking if a user or entity or device is who claims to be. In another terms, it is a set of verification and Identification. Authentication falls into three elements which are as follows −The knowledge factors − Something the user understand such as a password, pass phrase, or personal identification number (PIN), challenge response, design.The ownership factors − Something the user has wrist band, ID card, security token, cell phone with included hardware token, software token, or cell phone holding a software token.The inherence factors − Something the user is or does such as fingerprint, ... Read More
2K+ Views
There are various techniques of Authentication which are as follows −Password-based authentication − It is the simplest approach of authentication. It needed the password for the specific username. If the password connect with the username and both details connect the system's database, the user should be strongly authenticated.Vault authentication − In vault systems, authentication appear when the information about the user or machine is checked against an inside or outside system. The typical authentication forms for these systems are appearing through API or CLI.Email authentication − There are several different approaches to email authentication. The typical used standards are SPF, ... Read More
586 Views
There are various method of Authentication which are as follows −Biometrics − Biometrics is a term that defines the measuring unique individual characteristics including the retina, the iris, fingerprints or even the face. Today, the concept is usually used by most people to define a method for protecting computers and saved data requiring a user to endure a scan of the body part used for identification.While several systems need a fingerprint or retinal scan as a user password, systems that are serious about security frequently need a password and a biometric scan before open the computer or device.There are some ... Read More
530 Views
Two-factor AuthenticationTwo-factor authentication (2FA) a type of multi-factor authentication (MFA). It is an approach of creating access to an online account or computer system that needed the user to support two different types of information.It is a security procedure that cross-verifies users with two multiple forms of identification, most generally knowledge of an email address and authentication of control of a mobile phone.2FA is frequently employed in online banking websites, social media platforms and ecommerce sites as an approach to harden access controls to the more responsive location of a web application including admin panels or areas that store credit ... Read More