Skip to content

Tag Archives: cryptography

RC4 means Rivest Cipher 4 invented by Ron Rivest in 1987 for RSA Security. It is a Stream Ciphers. Stream Ciphers operate on a stream… Read More
There are three main objectives of computer security, which are also referred has CIA triads. Confidentiality Integrity Availability 1. Confidentiality : Data confidentiality – It is… Read More
1. Mobile Ad hoc Network (MANET) : MANET consists of number of mobile devices that are connected together to form a network, without any support from… Read More
The security of the RSA algorithm is based on the difficulty of factorizing very large numbers. The setup of an RSA cryptosystem involves the generation… Read More
Cryptography is the study of different techniques to secure data from an unauthorized entity. In computer science, we try to develop strategies and practices for… Read More
Cryptography is the study of different techniques to secure data from an unauthorized entity. In computer science, we try to develop strategies and practices for… Read More
Lamport One Time Signature is a method for constructing a digital signature and typically involved the use of a cryptographic hash function. As it is… Read More
1. Kerberos : Kerberos is a computer-network authentication system which is used for the authentication of users information while logging into the system. Kerberos is… Read More
1. Bluejacking : Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging… Read More
1. Monoalphabetic Cipher : A monoalphabetic cipher is any cipher in which the letters of the plain text are mapped to cipher text letters based on… Read More
Knapsack Encryption Algorithm is the first general public key cryptography algorithm. It is developed by Ralph Merkle and Mertin Hellman in 1978. As it is… Read More
Winternitz One Time Signature (WOTS) is a quantum resistant digital signature scheme that uses relatively small key and signature sizes. As it is a one-time… Read More
In cryptography, a Schnorr signature is a digital signature produced by the Schnorr signature algorithm that was described by Claus Schnorr. It is a digital… Read More
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is… Read More
1. SHA1 (Secure Hash Algorithm 1) : SHA1 is a cryptographic hash function which is designed by United States National Security Agency. It takes an… Read More

Start Your Coding Journey Now!