09-10-2010, 03:00 PM
[attachment=5528]
This article is presented by:
Nikunj Kabariya
SECURITY SOLUTIONS
Confidentiaity
Integrity
Availability
Authenticity
Non_Repudiability
Auditability
SECURITY SOLUTIONS
A simple encryption scheme could be one in which all Alphabetic and
numerical characters are shifted by fixed number of positions in thee
encryption text. If the characters are to be shifted by say 5 places
then result would be follows.
SYMMETRIC CRYPTOSYSTEMS
In the symmetric system the secret key is shared between two
persons or entities it is very important to be able to ensure the
secure exchange of secret key.Fig. Illustrate use of symmetric key.
ASYMMETRICAL CRYPTOSYSTEMS
Asymmetric or public key cryptosystems are built around the possession of a
Pair of keys –public key & a private key by each entity wishing to engage in secure communication.
ENCRYPTION METHOD
Substitution cipher
Transition cipher
.
This article is presented by:
Nikunj Kabariya
NETWORK SECURITY
SECURITY SOLUTIONS
Confidentiaity
Integrity
Availability
Authenticity
Non_Repudiability
Auditability
SECURITY SOLUTIONS
A simple encryption scheme could be one in which all Alphabetic and
numerical characters are shifted by fixed number of positions in thee
encryption text. If the characters are to be shifted by say 5 places
then result would be follows.
SYMMETRIC CRYPTOSYSTEMS
In the symmetric system the secret key is shared between two
persons or entities it is very important to be able to ensure the
secure exchange of secret key.Fig. Illustrate use of symmetric key.
ASYMMETRICAL CRYPTOSYSTEMS
Asymmetric or public key cryptosystems are built around the possession of a
Pair of keys –public key & a private key by each entity wishing to engage in secure communication.
ENCRYPTION METHOD
Substitution cipher
Transition cipher
.