Ginni has Published 1624 Articles

What are the functions of Public key Cryptography?

Ginni

Ginni

Updated on 15-Mar-2022 11:59:48

Public-key cryptography is also known as asymmetric cryptography. It is a form of cryptography in which a user has a set of cryptographic keys including public key and a private key. The functions of Public key Cryptography are as follows −Encryption − The encryption application supports the confidentiality and integrity ... Read More

What is Public-Key Cryptosystem in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 11:57:24

A public-key cryptosystem is that the messages is encrypted with one key and can only be decrypted with a second key, etc. A strong public-key system is one in which control of both the algorithm and the one key provides no beneficial information about the other key and thus no ... Read More

What is Discrete Logarithmic Problem in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 11:55:01

Let G be a finite cyclic set with n elements. It consider that the group is written multiplicatively. Let b be a generator of G and thus each element g of G can be written in the form g = bk for some integer k.Moreover, any two such integers defining ... Read More

What is the use of Chinese Remainder Theorem to generate random numbers for information security?

Ginni

Ginni

Updated on 15-Mar-2022 11:51:11

Random numbers are the numbers which play an essential role for various network security applications. There are some approaches that are used to generating random numbers including pseudorandom number generator and linear congruent generator also cryptographically generated random numbers etc.The main objective of the Chinese Reminder Theorem is to generating ... Read More

What is Fermat’s Little Theorem in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 11:45:24

Fermat's little theorem is a fundamental theorem in elementary number theory, which provides compute powers of integers modulo prime numbers. It is a specific case of Euler's theorem, and is essential in applications of elementary number theory, such as primality testing and public-key cryptography. This is referred to as Fermat’s ... Read More

What is AES Encryption and Decryption in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 11:30:08

AES encryption defines the phase of hiding electronic information using an approved 128-bit, 192-bit, or 256-bit symmetric encryption algorithm from the Advanced Encryption Standard (AES), also called a FIPS 197.In the 1990s, the US Government required to standardize a cryptographic algorithm which was to be used globally by them. It ... Read More

Why do we use Group, Ring and Fields in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 11:15:55

Groups, rings, and fields are the important elements of a branch of mathematics called as abstract algebra, or modern algebra. In abstract algebra, it is concerned with sets on whose elements and it can operate algebraically; that is, it can combine two elements of the set, perhaps in multiple ways, ... Read More

What is the most security-critical component of DES round function?

Ginni

Ginni

Updated on 15-Mar-2022 11:13:12

There are various component of DES which are as follows −Key Transformation − An initial 64-bit key is changed into a 56-bit key by discarding each 8th bit of the initial key. Therefore for each round, a 56 bit key is applicable. From this 56-bit key, there are several 48-bit ... Read More

What is the difference between Encryption and Steganography in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 11:08:39

EncryptionData encryption is a method of translating information from plaintext (unencrypted) to ciphertext (encrypted). Users can access encrypted information with an encryption key and decrypted information with a decryption key.There are large amounts of sensitive information handled and stored online in the cloud or on combined servers. Encryption needs cybersecurity ... Read More

What are the techniques of Monoalphabetic Cipher?

Ginni

Ginni

Updated on 15-Mar-2022 11:04:18

There are various techniques of Monoalphabetic cipher which are as follows −Additive Cipher − Additive cipher is one method of changing a permutation of the letters of the alphabet. Each letter in the alphabet is cyclically changed by the equivalent amount and the relative order of the letters is kept ... Read More

Advertisements