Ginni

Ginni

1,237 Articles Published

Articles by Ginni

Page 27 of 124

What are the functions of Public key Cryptography?

Ginni
Ginni
Updated on 15-Mar-2022 828 Views

Public-key cryptography is also known as asymmetric cryptography. It is a form of cryptography in which a user has a set of cryptographic keys including public key and a private key. The functions of Public key Cryptography are as follows −Encryption − The encryption application supports the confidentiality and integrity security services for the information. The public key supports the security services including authentication and non-repudiation.Encryption can be used to transform the plaintext message into unreadable format with the support of a key, again the message transform back to original message by using the decryption procedure.In this process, each user ...

Read More

What is Public-Key Cryptosystem in Information Security?

Ginni
Ginni
Updated on 15-Mar-2022 1K+ Views

A public-key cryptosystem is that the messages is encrypted with one key and can only be decrypted with a second key, etc. A strong public-key system is one in which control of both the algorithm and the one key provides no beneficial information about the other key and thus no indication as to how to decrypt the message.In public key cryptography, it is not applicable to calculate private key using the available public key in the network. Because of this reason public key can be completely available in the network.If a user encrypts a message with the public key of ...

Read More

What is Discrete Logarithmic Problem in Information Security?

Ginni
Ginni
Updated on 15-Mar-2022 5K+ Views

Let G be a finite cyclic set with n elements. It consider that the group is written multiplicatively. Let b be a generator of G and thus each element g of G can be written in the form g = bk for some integer k.Moreover, any two such integers defining g will be congruent modulo n. It can represent a function logb: G → Zn(where Zn indicates the ring of integers modulo n) by creating to g the congruence class of k modulo n. This function is a group isomorphism known as the discrete algorithm to base b.In mathematics, particularly ...

Read More

What is the use of Chinese Remainder Theorem to generate random numbers for information security?

Ginni
Ginni
Updated on 15-Mar-2022 3K+ Views

Random numbers are the numbers which play an essential role for various network security applications. There are some approaches that are used to generating random numbers including pseudorandom number generator and linear congruent generator also cryptographically generated random numbers etc.The main objective of the Chinese Reminder Theorem is to generating Random numbers. In essence, CRT says it is applicable to reconstruct integers in a certain range from their residues modulo a set of pair wise relatively prime modulo.CRT is one of the main theorems of mathematics. This can be utilized in the area of cryptography. It is a perfect set ...

Read More

What is AES Encryption and Decryption in Information Security?

Ginni
Ginni
Updated on 15-Mar-2022 818 Views

AES encryption defines the phase of hiding electronic information using an approved 128-bit, 192-bit, or 256-bit symmetric encryption algorithm from the Advanced Encryption Standard (AES), also called a FIPS 197.In the 1990s, the US Government required to standardize a cryptographic algorithm which was to be used globally by them. It is known as the Advance Encryption Standard (AES).Several proposols were submitted and after multiple debate, an algorithm known as Rijndael was accepted. Rijandael was invented by Joan Daemen and Vincent Rijmen. The need for appearing up with a new algorithm was actually because of recognized weakness in DES.The 56-bit keys ...

Read More

Why do we use Group, Ring and Fields in Information Security?

Ginni
Ginni
Updated on 15-Mar-2022 12K+ Views

Groups, rings, and fields are the important elements of a branch of mathematics called as abstract algebra, or modern algebra. In abstract algebra, it is concerned with sets on whose elements and it can operate algebraically; that is, it can combine two elements of the set, perhaps in multiple ways, and it can obtain a third element of the set.GroupA group (G) is indicated by {G, ∙}. It is a group of elements with a binary operation ′ ∙ ′ that satisfies four properties. The properties of Group are as follows −Closure − If a and b are elements of ...

Read More

What is the most security-critical component of DES round function?

Ginni
Ginni
Updated on 15-Mar-2022 622 Views

There are various component of DES which are as follows −Key Transformation − An initial 64-bit key is changed into a 56-bit key by discarding each 8th bit of the initial key. Therefore for each round, a 56 bit key is applicable. From this 56-bit key, there are several 48-bit subkey is produced during every round utilizing a procedure is known as key transformation. The 56-bit key is breaked into two halves, each 28 bits.Round12345678910111213141516Number of key bits shifted1122222212222221No of key bits shifted per roundIn key transformation procedure, it includes permutation and selection of a 48-bit key from original 56-bit ...

Read More

What is the difference between Encryption and Steganography in Information Security?

Ginni
Ginni
Updated on 15-Mar-2022 2K+ Views

EncryptionData encryption is a method of translating information from plaintext (unencrypted) to ciphertext (encrypted). Users can access encrypted information with an encryption key and decrypted information with a decryption key.There are large amounts of sensitive information handled and stored online in the cloud or on combined servers. Encryption needs cybersecurity to protect against brute-force and cyber-attacks, such as malware and ransomware.Data encryption operates by protecting transmitted digital information on the cloud and computer systems. There are two types of digital information, transmitted information or in-flight information and stored digital information or data at rest.The main objective of data encryption is ...

Read More

What are the techniques of Monoalphabetic Cipher?

Ginni
Ginni
Updated on 15-Mar-2022 2K+ Views

There are various techniques of Monoalphabetic cipher which are as follows −Additive Cipher − Additive cipher is one method of changing a permutation of the letters of the alphabet. Each letter in the alphabet is cyclically changed by the equivalent amount and the relative order of the letters is kept the similar.The number of position the letter has been transformed is known as key. For example if it can use a key value of 5, ‘a’ is changed 5 positions right in the alphabet to ‘F’, ‘b’, to ‘G’ and so on.The letter ‘u’ is changed to ‘Z’ and thus ...

Read More

How many Encryption Rounds are there in IDEA?

Ginni
Ginni
Updated on 15-Mar-2022 855 Views

IDEA stands for the International Data Encryption Algorithm. IDEA is a symmetric-key block cipher. It is denoted the same key can be used to encrypt the plaintext and decrypt the ciphertext.IDEA needed both the encrypting and decrypting parties to have a secret key that is different from a public-key and other asymmetric encryption schemes. The secret key popular to the encrypting party.IDEA is a patented and universally accessible block encryption algorithm, which allows the effective protection of transmitted and stored information against unauthorized access by third parties.The fundamental element for the development of IDEA were military durability for all security ...

Read More
Showing 261–270 of 1,237 articles
« Prev 1 25 26 27 28 29 124 Next »
Advertisements