what is cryptography?
Answers were Sorted based on User's Feedback
Answer / guest
The science and art of manipulating messages in order to
make them secure is called cryptography......
types are
symmetric key cryptography and asymmetric key cryptography
1)symmetric key cryptography
same key is used for encryption and decryption
eg :DES IDEA AES
2)Asymmetric key:
public key is used for both encryption and decryption
eg:RSA Difere Hellman
| Is This Answer Correct ? | 6 Yes | 1 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / janu
Cryptogarphy is the art and science of Converting the
Confidential Messages from Readable format to Unreadable
Format. It is mainly used to sending and receiving an
messages between the Sender and Receiver. There are two
types of Cryptography.
1. Symmetric: Same Key(Public Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format).
Both sender and Receiver Know this Public key.
2. ASymmetric: Different Key(Private Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format.
sender Should send a msg to the Receiver with one
key.That's known by Sender alone. The Receiver should use
some Algorithms to find that key and Decrypted the msg.
This type of cryptography is more confidential than the
Symmetric cryptography.
| Is This Answer Correct ? | 2 Yes | 0 No |
Which is easier, factoring or discrete log?
How do I find someone else's public key?
What is the discrete logarithm problem ?
What is S/MIME ?
What are the ITU-T (CCITT) Standards ?
What is SecurID ?
Are certifying authorities susceptible to attack?
How much extra message length is caused by using RSA?
Does RSA help detect altered documents and transmission errors?
Can we do the project in ENCRYPTION AND DECRYPTION as a operating system project? If yes how can we use the concepts?
What are LEAFs ?
What is a hash function ?