
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1522 Articles

Ginni
2K+ Views
There are various types of Cryptanalysis attack on AES which are as follows −Linear Cryptanalysis Attack − Linear cryptanalysis is based on discovering affine approximations to the element of a cipher. It tries to take benefit of high probability linear relationship that exist among inputs and outputs of a function ... Read More

Ginni
1K+ Views
Data encryption is the procedure of transforming information from a readable format to a scrambled element of information. This is completed to avoid prying eyes from reading confidential information in transit. Encryption can be used to documents, files, messages, or some different form of communication over a network.Encryption is a ... Read More

Ginni
7K+ Views
Linear CryptanalysisLinear cryptanalysis is a general style of cryptanalysis based on discovering affine approximations to the element of a cipher. Attacks have been produced for block ciphers and stream ciphers. Linear cryptanalysis is one of the two most broadly used attacks on block ciphers and the other being differential cryptanalysis.Linear ... Read More

Ginni
880 Views
Decryption is the procedure of changing encrypted information into its original, decipherable format. The phase of decryption takes the ambiguous information that was originally received and interprets it into words and images that a human can understand.Decryption is an important component of cybersecurity processes, because encryption needed scrambling words and ... Read More

Ginni
2K+ Views
SHASHA stands for Secure Hash Algorithm. The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions produced by the U.S. National Institute of Standards and Technology (NIST).The SHA 1 can take some arbitrary message as an input which is 264 bits in length and make 160-bit long message ... Read More

Ginni
3K+ Views
Linear cryptanalysis is a known plaintext attack, in which the attacker studies probabilistic linear relations referred to as linear approximations among parity bits of the plaintext, the Ciphertext and the hidden key.In this approach, the attacker acquire high probability approximations for the parity bit of the hidden key by computing ... Read More

Ginni
1K+ Views
There are various application of MD5 Algorithm are as follows −MD5 was produced to store one way hash of a password, and some document servers also supports pre-calculated MD5 checksum of a document so that the user can compare the checksum of the log in record to it.MD5 Algorithms are ... Read More

Ginni
3K+ Views
Differential cryptanalysis is a general model of cryptanalysis applicable generally to block ciphers, but it can also to stream ciphers and cryptographic hash functions. In the largest sense, it is the study of how differences in data input can influence the resultant difference at the output.The main objective of differential ... Read More

Ginni
2K+ Views
There are the following steps are performed to compute the message digest of the message which are as follows −Step 1 − Append padding bits − The message is continued or padded in such a method that its total length in bits is congruent to 448 modulo 512. This operation ... Read More

Ginni
1K+ Views
Hill Cipher is a multiletter polyalphabetic cipher invented by Lester S. Hill cipher is a coding system by combining the notion of a matrix with the approach of linear congruence in the phase of encrypting a plaintext into a ciphertext and decrypting a ciphertext into a plaintext.Hill Cipher does not ... Read More