what is cryptography?
Answers were Sorted based on User's Feedback
Answer / guest
The science and art of manipulating messages in order to
make them secure is called cryptography......
types are
symmetric key cryptography and asymmetric key cryptography
1)symmetric key cryptography
same key is used for encryption and decryption
eg :DES IDEA AES
2)Asymmetric key:
public key is used for both encryption and decryption
eg:RSA Difere Hellman
Is This Answer Correct ? | 6 Yes | 1 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / janu
Cryptogarphy is the art and science of Converting the
Confidential Messages from Readable format to Unreadable
Format. It is mainly used to sending and receiving an
messages between the Sender and Receiver. There are two
types of Cryptography.
1. Symmetric: Same Key(Public Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format).
Both sender and Receiver Know this Public key.
2. ASymmetric: Different Key(Private Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format.
sender Should send a msg to the Receiver with one
key.That's known by Sender alone. The Receiver should use
some Algorithms to find that key and Decrypted the msg.
This type of cryptography is more confidential than the
Symmetric cryptography.
Is This Answer Correct ? | 2 Yes | 0 No |
What is shamirs secret sharing scheme?
What is a message digest?
What key management issues are involved in public-key cryptography?
What is blowfish?
What is quantum computing ?
What is the Current Status of Clipper ?
How much extra message length is caused by using RSA?
What is tamper-resistant hardware ?
Which cryptologic mechanisms can be used to protect integrity?
How does the length of a hash value affect security?
How is RSA used for encryption in practice?
Should a public key or private key be shared among users?