Premium Essay

Crytography

In:

Submitted By spongesalt30
Words 316
Pages 2
Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). , It is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation.
There are two types of cryptography. Secret key cryptography is also known as symmetric key cryptography. With this type of cryptography, both the sender and the receiver know the same secret code, called the key. Messages are encrypted by the sender using the key and decrypted by the receiver using the same key. This method works well if you are communicating with only a limited number of people, but it becomes impractical to exchange secret keys with large numbers of people. In addition, there is also the problem of how you communicate the secret key securely.
Public key cryptography, also called asymmetric encryption, uses a pair of keys for encryption and decryption. With public key cryptography, keys work in pairs of matched public and private keys. The public key can be freely distributed without compromising the private key, which must be kept secret by its owner. Because these keys work only as a pair, encryption initiated with the public key can be decrypted only with the corresponding private key.
Strong cryptography or cryptographically strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis. Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring extensive testing and reviews, preferably in a public forum. Good algorithms and protocols are required, and good system design and implementation is needed as well. For instance, the operating system on which the crypto

Similar Documents

Premium Essay

Csec 630 1

...Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? I personal like all the ways that I saw in the above list. I think that a cryptanalyst would likely to use the Histogram. I personally think it is easier to read and the information that it gives is very valuable. It gives you the frequency and percent on how many times a certain character was used. Which if I think if I was a cryptanalyst this may help me out in deciphering the encrypted text. Q2. What do you notice about the histogram results when text is encrypted with the Vigenère cipher in comparison to the results of the Caesar cipher? Why is this the case? I really don’t see too much change however, what I have noticed from the first histogram using Caesar cipher vs. using Vigenère I noticed that E is no longer the letter with the most characters used like it was in the Caesar cipher. As a matter of fact it is between L, and K and really doesn’t give a character to use to help decipher it. We know that the letter could be a J but how many words or even phases have a lot of Js in its message? It seems that Vigenere is the better and more difficult cipher to use. Q3. There is an error in the following ciphertext representation of this quote, what is it? What should the correct ciphertext be? (Hint: when using the CrypTool there are several ways to decode one that you can use is “Playfair” encipher...

Words: 1234 - Pages: 5

Premium Essay

Dbms

...Section A: Multiple Choices: 1. Structured Query Language (SQL) is the language for working with b. RDBMS 2. Decomposition in database design means a. Breaking one table into multiple tables 3. Locking helps b. To solve concurrency problems 4. Database optimizer b. Minimizes the speed of query execution 5. Data is __________. a. Raw facts 6. Mobile computing means d. None of the above 7. Operation Data Store (ODS) provides c. Both (a) & (b) 8. Transaction is c. Logical unit of work 9. Transitive dependency is a. Indirect dependency relationship 10. Row in RDBMS is called b. Tuple True & False: 1. Database keys do not allow identification of records. False 2. A key is a minimal set of key minimal. True 3. Joins cannot be used to retrieve data from multiple tables. False 4. Data redundancy prefers to duplication of data. True 5. DML is used to retrieve or manipulate data stored in a database. True 6. Database keys do not allow identification of records. Flase 7. A super key is a set of column that identifies every row in a table. True 8. System recovery is sub-classified into transaction recovery and media recovery. False 9. Media recovery deals with disk error. True 10. The task of a DDBMS is quite complex. False Section B: Short Questions (20 marks) 1. What is SQL? Why is it a powerful language? ANS: SQL is an acronym that stands for "Structured Query Language" and it's used primarily...

Words: 2698 - Pages: 11