Ginni has Published 1624 Articles

What is Initial Permutation in DES?

Ginni

Ginni

Updated on 14-Mar-2022 10:01:05

An initial permutation is required only once at the starting of the encryption process. In DES, after the complete plaintext is divided into blocks of 64 bits each, IP is required on each of them. This initial permutation is a phase in the transposition procedure.The initial permutation appears only once, ... Read More

What are the requirement of hash function in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 10:00:44

A cryptographic hash function is a transformation that creates an input (or message) and restore a fixed-size string, which is known as the hash value. A hash value h is produced by a function H of the form −h = H(M)where M is the variable length message and H (M) ... Read More

What is Cryptographic Hash function in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 09:58:15

A cryptographic hash function is a numerical function used in cryptography. A cryptographic hash function integrate the message-passing capabilities of hash functions with security features.The term hash function has been used in computer science from quite frequently and it define as a function that compresses a string of arbitrary input ... Read More

How does DES works in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 09:58:14

DES is a block cipher. The encryption procedure is create of two permutations (Pboxes) that can be defined initial and final permutations, and 16 Feistel rounds. Each round need a different 48-bit round key produced from the cipher key in accordance with a predefined algorithm.DES is based on the two ... Read More

What are the following steps for the key generation of DES in information security?

Ginni

Ginni

Updated on 14-Mar-2022 09:55:14

Data Encryption Standard (DES) is a block cipher algorithm that creates plain text in blocks of 64 bits and transform them to ciphertext using keys of 48 bits. It is a symmetric key algorithm, which defines that the similar key is used for encrypting and decrypting information.DES takes a 64-bit ... Read More

What are the applications of Cryptographic hash function?

Ginni

Ginni

Updated on 14-Mar-2022 09:55:13

There are several applications of cryptographic hash function are as follows −Digital Signature − Hand-written signature is a method to prove that a paper file is signed by us and not by someone else. It can prove this and the current hand-written signature is compared with one or more of ... Read More

How does Secure Hash Algorithm works?

Ginni

Ginni

Updated on 14-Mar-2022 09:53:39

The Secure Hash Algorithm (SHA) was invented by the National Security Agency (NSA) and published in 1993 through the National Institute of Standard and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS PUB 180).SHA depends on and shares the similar building blocks as the MD4 algorithm. The design ... Read More

What are the attacks on DES in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 09:52:15

There are various attacks on DES which are as follows −Differential Cryptanalysis − The main objective of differential cryptanalysis is to view for statistical distributions and patterns in ciphertext to provide deduce element about the key used in the cipher.Differential cryptanalysis is a section of study in cryptography that compares ... Read More

What are the factors which affects the security of DES?

Ginni

Ginni

Updated on 14-Mar-2022 09:50:12

DES is a strong encryption standard that works on a 64-bits plaintext block and restore a 64-bits ciphertext. Therefore, DES results in a permutation between the 264 possible arrangements of 64 bits, each of which can be either 0 or 1.DES has 16 rounds and it can use the same set ... Read More

What is SHA in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 09:49:07

SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and used for hashing information and certificates. A hashing algorithm shortens the input information into a smaller form that cannot be learned by utilizing bitwise operations, modular additions, and compression functions.SHAs also help in revealing if an ... Read More

Previous 1 ... 5 6 7 8 9 ... 163 Next
Advertisements