Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 
Node is saved as draft in My Content >> Draft
  • Encryption in Networking

    • 0
    • 0
    • 0
    • 0
    • 0
    • 0
    • 0
    • 0
    • 40
    Comment on it

    Cryptography is the technique to make original data changed in some form which makes it difficult to understand and interpret. There are several cryptographic algorithms available present day as described below:

    • Secret Key

    • Public Key

    • Message Digest

     

     

     

    Secret Key Encryption

    Both sender and receiver have one secret key. This secret key is used to encrypt data from the sender.

    Then this key is sent to receiver and then data is decrypted.

     

    The Example of secret key encryption is Data Encryption Standard (DES). In Secret Key encryption, For each host on the network making it difficult to manage, separate key is required.

     

     

    Public Key Encryption

    In this the public key is used to encrypt data at the sender end. At the receiver end the same key is used to decrypt the data.

    Example of public key encryption is Rivest-Shamir-Adleman (RSA).

     

     

    Message Digest

    In this method, actual data is not sent, instead a hash value is calculated and sent. The other end user, computes its own hash value and compares with the one just received.If both hash values are matched, then it is accepted otherwise rejected.

     

    Networking

 0 Comment(s)

Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: