All about encryption schemes


Ankitsharmappt

Uploaded on Jul 11, 2019

Category Technology

Presentation on "All about encryption schemes"

Category Technology

Comments

                     

All about encryption schemes

ALL ABOUT ENCRYPTION SHEMES. Threatpost Introduction Encryption means, Encoding an information in a secure format so that, only you can access it. You can give authorities to person you want to give access to your information. Encrypted message is called as plain text in any Encryption scheme. javaquery Applications Military Government Defense system Scientific projects javaquery Basic Encryption schemes Symmetric Key Public key Symmetric As name suggest in these scheme both Key the encryption and decryption keys are symmetric. When sender send message with some encryption key, receiver has to put same key to read the message. Rapidsslonline.com Enigma Machine is the best example of symmetric key. Public As name suggest in these scheme the encryption keys are open to everyone Key to secure message. Decryption keys are different for every reader. If you know the decryption key only then you can access the information. Other 1. Multiple encryption Important 2. Substitution cipher 3. Rotor cipher machine Encryption 4. Brute force attack Schemes 5. Cold boot attack 6. Encrypted function Amrita vishwa vidyapitham 1. Multiple encryption  In this type of encryption message will be encrypted several times. 2. Substitution cipher  In this type of encryption cipher text is used instead of plaintext. 3. Rotor cipher machine  Electro-mechanical rotor machine is used for coding and to secure your data. 4. Brute force attack  Several passwords are used to read the encrypted message. 5. Cold boot attack If your important data is lost, you can use cold boot attack to restore it. 6. Encrypted function You can encrypted your data with mobile code.