M1-Analyse how the principles and uses of cryptography impact on the security and protection of data PDF

Title M1-Analyse how the principles and uses of cryptography impact on the security and protection of data
Author Kashif Mahmood
Course The Business of Books
Institution University of Reading
Pages 2
File Size 52.1 KB
File Type PDF
Total Downloads 97
Total Views 129

Summary

sdcmadcmadcpad...


Description

Kashif Mahmood Analyse how the principles and uses of cryptography impact on the security and protection of data Symmetric key encryption is one of cryptography's applications. The encryption key can be determined from the decryption key in symmetric key encryption. The same key is used for both encryption and decryption in most symmetric algorithms. Because of the encryption and decryption, users should not encounter any major time delays. It also offers some level of protection. Only if the symmetric key is kept secret by both parties is it efficient. Public-Key Encryption is another example of a cryptographic programme. RSA Data Security has proprietary algorithms for public-key encryption. A public key is associated with an entity that needs to authenticate, while a private key is associated with the entity that needs to authenticate. Only your private key can be used to decrypt your public key. Key exchanges are another example of a cryptographic programme. The first widely used method of securely creating and sharing keys over an unreliable channel was key exchanges. Encrypting the message with a code is the most common approach. Encrypting the message with a code is the most common approach. The simplest method is to prepare whatever form of code and key you want to use ahead of time. The letter "a" becomes "b," every "b" becomes "c," every "c" becomes "d," and so on, until the letter "z" becomes a "a." A digital certificate is another example of a cryptographic programme. The public key being approved, as well as identifying details about the person that holds the public key, are all included in digital certificates. A digital certificate is a record that is stored electronically. It includes the public key for a digital signature as well as the identification associated with the key, such as an organization's name. A driver's licence, passport, business ID, or school ID are examples of this. The https protocol is another example of a cryptographic application. http:// It is used to communicate securely over the internet or a network. Transport Layer Security is used to encrypt the communication protocol. This is the primary method for transferring data from web pages through a network. Web pages are stored on servers and served to client computers when the user requests them. To

Kashif Mahmood secure a connection and verify that the site is legitimate, it uses a secure certificate from a third-party vendor. VPN is another example of a cryptographic programme. VPN encryption is the method of protecting data in the VPN client-VPN server tunnel so that it cannot be accessed by unauthorised parties. When you submit a request to join a VPN server, the link requests are encrypted before being sent to the server. To secure the transfer of AES keys, VPNs use public-key encryption....


Similar Free PDFs