![]() ![]() The public key is used for encryption and for decryption private key is used. Public key may be freely distributed, while its paired private key, remains a secret. In Public-Key Cryptography two related keys (public and private key) are used. Public-Key Cryptography: This is the most revolutionary concept in the last 300-400 years. On the other side the receiver applies the same key to decrypt the message and recover the plain text. The sender uses this key to encrypt plaintext and send the cipher text to the receiver. Symmetric-key Cryptography: Both the sender and receiver share a single key. Three types of cryptographic techniques used in general. Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at a later stageĪuthentication - Sender and receiver can confirm eachĬryptography is used in many applications like banking transactions cards, computer passwords, and e- commerce transactions. Integrity - Information cannot be altered. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.ĭescription: Earlier cryptography was effectively synonymous with encryption but nowadays cryptography is mainly based on mathematical theory and computer science practice.Ĭonfidentiality - Information cannot be understood by anyone ![]() It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. ![]() Definition: Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |