Skip to content

Tag Archives: cryptography

These models are mainly used for Defense Purpose i.e., securing the data or the asset. There are 2 main types of Security Defense Models: Lollipop… Read More
Privacy Enhanced Mail (PEM) is an email security standard to provide secure electronic mail communication over the internet. Security of email messages has become extremely… Read More
1. DOS Attack is a denial of service attack, in this attack a computer sends a massive amount of traffic to a victim’s computer and… Read More
Cryptography is the study of conversion of plain text(readable format) to ciphertext(non-readable format) i.e. encryption. It is also called the study of encryption. Cryptology, on… Read More
Data, a word which is now spoken every time one or the other way, people are working in corporate throughout the day with small scale… Read More
As we have studied, signature is a way of authenticating the data coming from a trusted individual. Similarly, digital signature is a way of authenticating… Read More
Given a number N, the task is to convert the given number into a Cypher string on the basis of below conditions:   If N is… Read More
In this article, we will study why there is a need of security in brief followed by what exactly Program threats (like Trojan Horse and… Read More
Majority of the image compression techniques are usually associated with type of image. Enterprises or individuals who are interested to share high resolution documents in… Read More
1. ZIP : It is a file format that supports lossless data compression and archiving. Phil Katz was the developer of this file format in 1989.… Read More
Cryptography is a technique of securing information and communications through the use of codes so that only those person for whom the information is intended… Read More
Autokey Cipher is a polyalphabetic substitution cipher. It is closely related to the Vigenere cipher but uses a different method of generating the key. It… Read More
Given two strings str1 and str2 containing alpha-numeric characters and a number N. The task is to form a new encrypted string which contains the… Read More
Distributed Denial of Service (DDoS) is a type of DOS attack where multiple systems, which are trojan infected, target a particular system which causes a… Read More
A hash function is a mathematical function that takes an input string of any length and converts it to a fixed-length output string. The fixed-length… Read More

Start Your Coding Journey Now!