Cryptography Benefits & Drawbacks
In this section, we will discuss the Benefits & Drawbacks of Cryptography. Nowadays, the networks have gone global and information has taken the digital form of bits and bytes. Critical…
Cryptography
In this section, we will discuss the Benefits & Drawbacks of Cryptography. Nowadays, the networks have gone global and information has taken the digital form of bits and bytes. Critical…
The most distinct feature of Public Key Infrastructure (PKI) is that it uses a pair of keys to achieve the underlying security service. The key pair comprises of private key…
Digital signatures are the public-key primitives of message authentication. In the physical world, it is common to use handwritten signatures on handwritten or typed messages. They are used to bind…
In the last chapter, we discussed the data integrity threats and the use of hashing technique to detect if any modification attacks have taken place on the data. Another type…
Hash functions are extremely useful and appear in almost all information security applications. A hash function is a mathematical function that converts a numerical input value into another compressed numerical…
Until now, we discussed the use of symmetric and public key schemes to achieve the confidentiality of information. With this chapter, we begin our discussion on different Data Integrity cryptographic…
Public Key Cryptography Unlike symmetric key cryptography, we do not find historical use of public-key cryptography. It is a relatively new concept. Symmetric cryptography was well suited for organizations such…
In this chapter, we will discuss the different modes of operation of a block cipher. These are procedural rules for a generic block cipher. Interestingly, the different modes result in…
The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It is found at least six time faster than triple…
In this section, we will discuss Triple DES. The speed of exhaustive key searches against DES after 1990 began to cause discomfort amongst users of DES. However, users did not…