Ginni has Published 1522 Articles

What are the benefits of data encryption in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 08:26:45

830 Views

Encryption is the procedure of changing plain text into ciphertext, i.e., changing the text from readable format to non-readable format to protect the conversation among two parties or from the unauthorized person.A private key can be used to fastly encrypt the plain text. There are several techniques and algorithms have ... Read More

What is the difference between Confusion and Diffusion in information security?

Ginni

Ginni

Updated on 14-Mar-2022 08:24:07

10K+ Views

ConfusionConfusion defines making the relationship between the key and the cipher as difficult and as included as possible. In other words, the technique provides that the ciphertext provides no clue about the plaintext.In this regard, the relationship between the data of the cipher text and the value of the encryption ... Read More

What are the techniques of data Encryption?

Ginni

Ginni

Updated on 14-Mar-2022 08:23:47

384 Views

There are some techniques of Data Encryption are as follows −DES − DES stands for Data Encryption Standard. The Data Encryption Standards (DES) algorithm was invented by IBM in the early 1970s. It accepts the plaintext in 64-bit blocks and transform it into the ciphertext that need the 64-bit keys ... Read More

What is Password Salting in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 08:21:03

394 Views

Password salting is a form of password encryption that includes appending a password to a given username and thus hashing the new string of characters. This is generally done through an MD5 hashing algorithm.Password-salting is generally found within Linux operating systems, and it is usually considered a more secure password ... Read More

What is Confusion in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 08:20:29

1K+ Views

Confusion defines that the key does not associate in a simple method to the ciphertext. In specific, each character of the ciphertext should be based on several elements of the key.In confusion, the relationship between the data of the ciphertext and the value of the encryption key is made difficult. ... Read More

How hashing is used in security encryption?

Ginni

Ginni

Updated on 14-Mar-2022 08:18:28

277 Views

Hashing is basically a one-way cryptographic function. Because hashes are irreversible, understanding the output of a hashing method does not enable us to regenerate the contents of a file. It enables us to assess whether two files are same without understanding their contents.The use of hashing in information security and ... Read More

What is Diffusion in information security?

Ginni

Ginni

Updated on 14-Mar-2022 08:18:24

2K+ Views

Diffusion is an encryption process where the authority of one plaintext symbol is spread over some ciphertext symbols with the objective of hiding statistical properties of the plaintext. A simple diffusion element is the bit permutation, which can be used frequently within DES. AES need the more advanced Mix-column process.Ciphers ... Read More

What are the popular Encryption Algorithm?

Ginni

Ginni

Updated on 14-Mar-2022 08:15:14

303 Views

There are some popular Encryption Algorithm are as follows − Triple DES − Triple DES was intended as a successor to the once generally used Data Encryption Standard (DES) algorithm. This symmetric-key approach of data encryption was create obsolete by the hackers who continually exploited its vulnerabilities.Triple DES succeeded that develop ... Read More

What are the components of Modern Block Cipher in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 08:14:57

11K+ Views

A modern block cipher is a cipher which encrypts m-bit block of plaintext and decrypts m-bit block of ciphertext. For encryption or decryption, modern block cipher facilitate a K bit key and the decryption algorithm should be inverse of encryption algorithms and for both encryption and decryption similar key is ... Read More

What are the types of Hashing in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 08:13:27

731 Views

There are various types of hashing are as follows − RIPEMD − RIPEMD was produced in Europe as an element of RIPE project in 96 by researcher included in attacks on MD4/5. It is same as MD5/SHA and uses two parallel lines of 5 round of 16 steps. It makes a ... Read More

Advertisements