
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1522 Articles

Ginni
726 Views
There are various elements of DES which are as follows −Use of S-Boxes − The tables used for substitution i.e., the S-boxes, in DES are kept hidden by IBM. IBM supports that it took them over 17 person years to appear up with the internal design of the S-boxes.Key Length ... Read More

Ginni
940 Views
This operation expands the right half of the information, R from 32 bits to 48 bits and this operation changes the order of the bits as well as repeating specific bits. It is called an expansion permutation.This operation has two objective including it creates the right half the similar size ... Read More

Ginni
1K+ Views
DES uses 16 rounds. Each of the 16 rounds includes the broad-level steps are as follows −Key Transformation − An initial 64-bit key is changed into a 56-bit key by discarding each 8th bit of the initial key. Therefore for each round, a 56 bit key is available. From this ... Read More

Ginni
10K+ Views
An initial permutation is required only once at the starting of the encryption process. In DES, after the complete plaintext is divided into blocks of 64 bits each, IP is required on each of them. This initial permutation is a phase in the transposition procedure.The initial permutation appears only once, ... Read More

Ginni
9K+ Views
A cryptographic hash function is a transformation that creates an input (or message) and restore a fixed-size string, which is known as the hash value. A hash value h is produced by a function H of the form −h = H(M)where M is the variable length message and H (M) ... Read More

Ginni
554 Views
A cryptographic hash function is a numerical function used in cryptography. A cryptographic hash function integrate the message-passing capabilities of hash functions with security features.The term hash function has been used in computer science from quite frequently and it define as a function that compresses a string of arbitrary input ... Read More

Ginni
754 Views
DES is a block cipher. The encryption procedure is create of two permutations (Pboxes) that can be defined initial and final permutations, and 16 Feistel rounds. Each round need a different 48-bit round key produced from the cipher key in accordance with a predefined algorithm.DES is based on the two ... Read More

Ginni
11K+ Views
Data Encryption Standard (DES) is a block cipher algorithm that creates plain text in blocks of 64 bits and transform them to ciphertext using keys of 48 bits. It is a symmetric key algorithm, which defines that the similar key is used for encrypting and decrypting information.DES takes a 64-bit ... Read More

Ginni
15K+ Views
There are several applications of cryptographic hash function are as follows −Digital Signature − Hand-written signature is a method to prove that a paper file is signed by us and not by someone else. It can prove this and the current hand-written signature is compared with one or more of ... Read More

Ginni
13K+ Views
The Secure Hash Algorithm (SHA) was invented by the National Security Agency (NSA) and published in 1993 through the National Institute of Standard and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS PUB 180).SHA depends on and shares the similar building blocks as the MD4 algorithm. The design ... Read More