
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1522 Articles

Ginni
4K+ Views
Steganography is an approach that facilitates concealing of a message that is to be kept secret inside other message. This result is the concealment of the secret message itself.Steganography approach can be used to images, a video file or an audio file. Generally, however, steganography is written in characters such ... Read More

Ginni
4K+ Views
Cryptanalysis is the decryption and inquiry of codes, ciphers or encrypted text. Cryptanalysis need numerical rule to search for algorithm susceptibility and divide into cryptography or information security systems.The main objective of cryptanalysis is to discover weaknesses in or otherwise defeat encryption algorithms. This research can be used by cryptographers ... Read More

Ginni
2K+ Views
There are various types of security mechanism which are as follows −Physical Security − Physical security define limiting access to key network resources by maintaining the resources behind a locked door and secured from natural and human-made disasters.Physical security can secure a network from unintended exploitation of network equipment by ... Read More

Ginni
42K+ Views
There are various security services which are as follows −Message Confidentiality − The principle of confidentiality defines that only the sender and the intended recipient should be capable to create the element of the message. It protects the transmitted data from passive attack.Confidentiality can be used at several levels on ... Read More

Ginni
3K+ Views
A true random number generator (TRNG) uses a nondeterministic source to make randomness. Most function by measuring unpredictable natural processes, including pulse detectors of ionizing radiation activities, gas discharge tubes, and leaky capacitors.Intel has developed a commercially accessible chip that samples thermal noise by developing the voltage measured across undriven ... Read More

Ginni
797 Views
A Feistel cipher is a cryptographic approach used in the construction of block cipherbased algorithms and structure. A Feistel network implements a sequence of iterative ciphers on a block of information and is frequently designed for block ciphers that encrypt huge quantities of data.A Feistel network operates by splitting the ... Read More

Ginni
654 Views
Stream CipherA stream cipher is one that encrypts a digital data flow one bit or one byte at a time. Stream Cipher generally encrypts one byte of the message at that moment rather than using blocks.For example, classical stream ciphers are the auto crucial Vigenère cipher and the Vernam cipher. ... Read More

Ginni
532 Views
A cryptosystem is also called a cypher system. It implements cryptographic techniques using several cryptographic components including plain text, encryption algorithm, cypher text, decryption algorithm, and encryption key to support information security services.A cryptosystem is a set of algorithms such as one for the encryption of data and another for ... Read More

Ginni
3K+ Views
A symmetric cipher is one that uses the similar key for encryption and decryption. The use of a symmetric cipher presents the well-known challenge of how to share the secret key between the parties fast, as an unauthorized party to the communication can prevent it and eavesdrop on future communication.There ... Read More

Ginni
569 Views
AuthenticationAuthentication is the procedure of providing that an individual is the person that they claim to be. This contains matching a person’s claimed identity asserted through a credential (such as an ID card or unique ID number) against one or more authentication factors that are destined to that credential.Authentication is ... Read More