Skip to content

Tag Archives: cryptography

Winternitz One Time Signature (WOTS) is a quantum resistant digital signature scheme that uses relatively small key and signature sizes. As it is a one-time… Read More
In cryptography, a Schnorr signature is a digital signature produced by the Schnorr signature algorithm that was described by Claus Schnorr. It is a digital… Read More
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is… Read More
1. SHA1 (Secure Hash Algorithm 1) : SHA1 is a cryptographic hash function which is designed by United States National Security Agency. It takes an… Read More
These models are mainly used for Defense Purpose i.e., securing the data or the asset. There are 2 main types of Security Defense Models: Lollipop… Read More
Privacy Enhanced Mail (PEM) is an email security standard to provide secure electronic mail communication over the internet. Security of email messages has become extremely… Read More
1. DOS Attack is a denial of service attack, in this attack a computer sends a massive amount of traffic to a victim’s computer and… Read More
Cryptography is the study of conversion of plain text(readable format) to ciphertext(non-readable format) i.e. encryption. It is also called the study of encryption. Cryptology, on… Read More
Data, a word which is now spoken every time one or the other way, people are working in corporate throughout the day with small scale… Read More
As we have studied, signature is a way of authenticating the data coming from a trusted individual. Similarly, digital signature is a way of authenticating… Read More
Given a number N, the task is to convert the given number into a Cypher string on the basis of below conditions:   If N is… Read More
In this article, we will study why there is a need of security in brief followed by what exactly Program threats (like Trojan Horse and… Read More
Majority of the image compression techniques are usually associated with type of image. Enterprises or individuals who are interested to share high resolution documents in… Read More
1. ZIP : It is a file format that supports lossless data compression and archiving. Phil Katz was the developer of this file format in 1989.… Read More
Cryptography is a technique of securing information and communications through the use of codes so that only those person for whom the information is intended… Read More