Ginni has Published 1519 Articles

What is Firewalls in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:40:02

2K+ Views

A firewall can be represented as a specific type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a represented group of security rules. It facilitates as a barrier between inside private networks and outside sources (such as the public ... Read More

What is Kerberos in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:38:00

4K+ Views

Kerberos is a network authentication protocol designed to support powerful authentication for client/server applications using secret-key cryptography. Kerberos provides the largest level of security to network resources.Kerberos was produced by MIT as a solution to these network security issues. The Kerberos protocol uses powerful cryptography so that a user can ... Read More

What are the keys used by PGP in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:35:20

4K+ Views

PGP creates use of four types of keys including one-time session symmetric keys, Public keys, Private keys, and Passphrase based symmetric keys.Session key generation − Each session key is related to a single message and is used only for the goals of encryption and decrypting that message. Remind that message ... Read More

What are the services of PGP?

Ginni

Ginni

Updated on 07-Mar-2022 07:33:15

20K+ Views

PGP includes the following services which are as follows −Authentication − The hash function used is SHA-1 which makes a 160 bit message digest. EP (DP) defines public encryption (decryption) and the algorithm used can be RSA or DSS.The set of SHA-1 and RSA supports an effective digital signature scheme. ... Read More

What is PGP in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:31:30

3K+ Views

PGP stands for Pretty Good Privacy. It is an encryption program that uses cryptographic privacy and authentication to online communications. PGP is most generally used for maintaining contents of emails encrypted and private. PGP is accessible as a plugin for some e-mail clients, including Claris Emailer, Microsoft Outlook/Outlook Express, and ... Read More

What is Hashing in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:29:20

5K+ Views

Hashing is the procedure of translating a given key into a code. A hash function can be used to substitute the data with a newly generated hash code. Hash algorithms are generally used to offer a digital fingerprint of a file’s contents often used to provide that the file has ... Read More

What is Public key cryptography in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:27:26

4K+ Views

Public key cryptography is an encryption method that needs a paired public and private key (or asymmetric key) algorithm for secure data communication. Public-key cryptography is also called an asymmetric cryptography. It is a form of cryptography in which a user has a pair of cryptographic keys including public key ... Read More

What is the use of stream ciphers in information security?

Ginni

Ginni

Updated on 04-Mar-2022 11:08:10

539 Views

A stream cipher is an approaches of encryption where a pseudorandom cipher digit stream is mixed with plain text digits. This pseudorandom cipher digit stream is used to each binary digit, one bit at a time. This approach of encryption uses an infinite number of pseudorandom cipher digits per key.A ... Read More

What are the Symmetric Key Cryptography in information security?

Ginni

Ginni

Updated on 04-Mar-2022 11:06:03

18K+ Views

Symmetric key cryptography is a type of encryption scheme in which the similar key is used both to encrypt and decrypt messages. Such an approach of encoding data has been largely used in the previous decades to facilitate secret communication between governments and militaries.Symmetric-key cryptography is called a shared-key, secret-key, ... Read More

What are the Algorithm of Cryptographic in information security?

Ginni

Ginni

Updated on 04-Mar-2022 11:04:31

365 Views

There are several algorithms of cryptographic which are as follows −Symmetric key Cryptography − In symmetric key cryptography, an individual key is used for both encryption and decryption. The sender needs the key (or some group of rules) to encrypt the plaintext and sends the cipher text to the receiver. ... Read More

Advertisements