Skip to content

Tag Archives: cryptography

Computer Architectures have predefined ASCII values & Binary forms for all printable characters, which allows us to operate bit-wise logic like XOR and most encryption/decryption… Read More
Cryptographic Hash is a Hash function that takes random size input and yields a fixed-size output. It is easy to calculate but challenging to retrieve… Read More
A Secret Sharing Scheme is a Cryptographic Scheme that involves the breaking up of a secret value into multiple fragments/shares in a manner that prevents… Read More
Digital Signatures are an Asymmetrically encrypted hash of a digital message(data). It is a value that can provide a guarantee of authenticity, non-repudiation, and integrity.… Read More
RC4 means Rivest Cipher 4 invented by Ron Rivest in 1987 for RSA Security. It is a Stream Ciphers. Stream Ciphers operate on a stream… Read More
There are three main objectives of computer security, which are also referred has CIA triads. Confidentiality Integrity Availability 1. Confidentiality : Data confidentiality – It is… Read More
1. Mobile Ad hoc Network (MANET) :  MANET consists of number of mobile devices that are connected together to form a network, without any support… Read More
The security of the RSA algorithm is based on the difficulty of factorizing very large numbers. The setup of an RSA cryptosystem involves the generation… Read More
Cryptography is the study of different techniques to secure data from an unauthorized entity. In computer science, we try to develop strategies and practices for… Read More
Cryptography is the study of different techniques to secure data from an unauthorized entity. In computer science, we try to develop strategies and practices for… Read More
Lamport One Time Signature is a method for constructing a digital signature and typically involved the use of a cryptographic hash function. As it is… Read More
1. Kerberos : Kerberos is a computer-network authentication system which is used for the authentication of users information while logging into the system. Kerberos is… Read More
1. Bluejacking : Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging… Read More
1. Monoalphabetic Cipher : A monoalphabetic cipher is any cipher in which the letters of the plain text are mapped to cipher text letters based on… Read More
Knapsack Encryption Algorithm is the first general public key cryptography algorithm. It is developed by Ralph Merkle and Mertin Hellman in 1978. As it is… Read More