what is cryptography?
Answers were Sorted based on User's Feedback
Answer / guest
The science and art of manipulating messages in order to
make them secure is called cryptography......
types are
symmetric key cryptography and asymmetric key cryptography
1)symmetric key cryptography
same key is used for encryption and decryption
eg :DES IDEA AES
2)Asymmetric key:
public key is used for both encryption and decryption
eg:RSA Difere Hellman
| Is This Answer Correct ? | 6 Yes | 1 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / adu
cryptography is the process of sending data in a secure
manner in a network by using encryption and decryption
techniques. various algorithms are available for encryption
and decryption, for example RSA algorithm.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / janu
Cryptogarphy is the art and science of Converting the
Confidential Messages from Readable format to Unreadable
Format. It is mainly used to sending and receiving an
messages between the Sender and Receiver. There are two
types of Cryptography.
1. Symmetric: Same Key(Public Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format).
Both sender and Receiver Know this Public key.
2. ASymmetric: Different Key(Private Key) is used for both
Encryption( Unreadable fromat) and Decryption(Readable
Format.
sender Should send a msg to the Receiver with one
key.That's known by Sender alone. The Receiver should use
some Algorithms to find that key and Decrypted the msg.
This type of cryptography is more confidential than the
Symmetric cryptography.
| Is This Answer Correct ? | 2 Yes | 0 No |
Why use RSA rather than DES?
What are the best discrete logarithm methods in use today ?
How are certificates used?
What are covert channels ?
Who needs a key?
What is a compression function?
What is PKCS ?
Which cryptologic mechanisms can be used to protect integrity?
What other hash functions are there ?
What are the alternatives to rsa?
What is SET ?
What are cryptography standards ?