Cryptography simple report
#1

Cryptography simple report

[attachment=15951]

What is Cryptography?

This is the art of
keeping messages
secret


Secret Key Cryptography-

Follows SYMMETRIC
ALGORITHMS.
Single key used to
encrypt and decrypt.
Key must be known
by both parties.

Public Key Cryptography-

Follows ASYMMETRIC
ALGORITHMS.
Each entity has 2 keys:
private key (a secret)‏
public key (well known)‏

Using Keys


Private keys are used for
decrypting.
Public keys are used for
encrypting.
encryption
plaintext ----------------- ciphertext

public key

decryption
Ciphertext ----------------- plaintext

private key

Message Digest

Also known as “hash function” or “one-way
transformation”.

Transforms a message
of any length and
computes a fixed
length string.

Need of Digest-
Alisha could just encrypt her name, and then
Bijay could decrypt it with IMAGE



Reply
#2
to get information about the topic cryptography full report fullreport,ppt and related topic refer the page link bellow

http://studentbank.in/report-palladium-c...ars-report

http://studentbank.in/report-seminars-re...yptography

http://studentbank.in/report-palladium-c...ort?page=2

http://studentbank.in/report-new-trends-...ull-report

http://studentbank.in/report-cryptography-full-report

http://studentbank.in/report-java-crypto...-jca--3542

http://studentbank.in/report-cryptograph...ull-report

http://studentbank.in/report-cryptograph...ganography

http://studentbank.in/report-cryptograph...curity-ppt

http://studentbank.in/report-imbricate-c...aphy--4792

http://studentbank.in/report-quantum-cryptography

http://studentbank.in/report-cryptography-simple-report

http://studentbank.in/report-palladium-cryptography
Reply
#3

Cryptography simple report

[attachment=16985]
Main sources
 Network Security Essential / Stallings
 Applied Cryptography / Schneier
 Handbook of Applied Cryptography / Menezes, van
Oorschot, Vanstone
 Innovative Cryptography, N. Moldovyan , A.Moldovyan
 Modern Cryptography: Theory and Practice, Wenbo Mao


Steganography
 .Steganography
 Steganos = “covered” in Greek, Graphein = “to write”
 .Being able to communicate secretly has always been
considered an advantage
 Secret messages were often not written down, but rather
memorized by sworn messengers
 .Or hidden
 Demaratus, a Greek immigrant to Persia, reveals Persia’s
intention to attack Athens. Writes the secret message on a
tablet, and covers it with wax.
 Histaiaeus encourages Aristagoras of Miletus to revolt
against the Persian King. Writes message on shaved head
of the messenger, and sends him after his hair grew
 Chinese wrote on silk, turned into wax-covered ball that was
swallowed by the messenger


The classical cryptographic task is to provide for
a reversible transformation of an understandable
plaintext (original text) to a seemingly random
character sequence called a ciphertext or a
cryptogram.

 The security of modern cryptosystems is not
based on the secrecy of the algorithm, but on
the secrecy of a relatively small amount of
information, called a secret key.


Applications of Cryptography
 Protection against unauthorized reading (or providing information privacy)
 Protection against creating false messages (both intentional and
unpremeditated)
 Valid user authentication
 Information integrity control
 Information authentication
 Digital signatures
 Computerized secret voting
 Digital cash
 Computerized coin-tossing
 Protection against the repudiation of the receipt of a message
 Simultaneous contract signing
 Protection against document forgery
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: report on cryptography, simple inverter seminar report, cryptography report, simple seminar report, project report on simple cryptography, menezes qu vanstone,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cryptography and Steganography electrical engineering 6 13,793 11-02-2012, 01:26 PM
Last Post: seminar addict
  DEVELOPMENT OF SIMPLE PWM INVERTER USING PHOTOVOLTAIC CELLS seminar class 0 8,818 04-05-2011, 02:47 PM
Last Post: seminar class
  A simple bus computer science crazy 0 8,377 17-04-2009, 08:19 PM
Last Post: computer science crazy

Forum Jump: