2011年5月11日星期三

Network Security- What is Cryptography-_4182

Network Security: What is Cryptography?

Cryptography is derived from a rough Greek translation for “Secret Writing”. Cryptography is all about mangling information into a block of characters that apparently don’t make any sense. However, all of this mangled information can be unmangled by deploying some secret methods.

Cryptography is very useful from an IT company or an IT user’s point of view because it provides for the following:

Enhanced Security: Cryptography is now the standard protocol to deploy enhanced security levels in anything that has “digital” written all over it. Increased cheap business dependence on email correspondence and internet has led to an insatiable need for sustaining methodologies that use Cryptography. Integrity Checks: Using replacement cryptography hp pavilion zv5000 battery, tremendous amount of reassurance is possible for the recipients because they would have a way to find out if the incoming message has been tampered with in shop any way. It enables to find out if the message is coming from a legitimate source. Authentication: As first line of defense, cryptography is increasingly used for cheap authentication purposes which, in effect, help to verify the identity of someone or something.

The original message that is intended for cryptography to be charger applied on (to be encrypted) is called as “plaintext” or “cleartext”. The process of changing into unintelligible blocks of characters is called gateway encryption and the process of turning it back into “plaintext” is called “decryption” (this is the reverse of encryption).

The people new who are able to do all of this encryption are called cryptographers and they have a formidable opposing camp called as cryptanalysts (whose expertise is store decryption). These opposing camps are forever at logger ahead and are trying to outdo each other.

An Algorithm and a secret value is always an integral part of the compaq Cryptographic systems. This secret value is called as a “key”. For a said system, an algorithm is devised once and the knowledge is made public. However Ibm Thinkpad X41 Battery, discount all message transmission is encrypted or decrypted using the key that is unique for each user. Just knowing how an algorithm works isn’t going to help anyone acer aspire decrypt with the key which only the person holding it would know.

Think of the entire cryptographic system as a combination lock. You know how combination zxcsky09520 locks are made Dell Xps M1530 Battery, don't you? When you purchase a lock Ibm Thinkpad X41 Battery, you are allowed to set your own combination which would allow you access to whatever it is that is being locked up.

1 条评论:

  1. From security point of view cryptography is the most powerful and effective process which is being used in most of the high level applications/tools specially designed to secure information. I am familiar with the basic meaning but the above information gave me a detailed idea about it.
    eSignature

    回复删除