全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Review on Cryptography Mechanisms

Keywords: Cryptography , Encryption , Decryption

Full-Text   Cite this paper   Add to My Lib

Abstract:

In today's information age, communications play an important role which is becoming widespread as well. The same aspects of cryptography that make it useful for security and privacy make it particularly troublesome for law enforcement. The use of cryptography by criminals can prevent law enforcement from obtaining information needed for the prevention and prosecution of crime. The international organizations have acted to regulate cryptography and protect the legitimate interests of law enforcement, while attempting to balance the needs of legitimate users of cryptography. Cryptography can be classifies into Symmetric and asymmetric encryption algorithms as shown in Figure. A symmetric encryption algorithm consists of a pair of functions, encrypt and decrypt. If plaintext is encrypted with key K and the resulting cipher text is decrypted with key K then the original plaintext is contributed to the growth of technologies. Electronic security is increasingly involved in making communications more prevalent. Therefore, a mechanism is needed to assure the security and privacy of information that is sent over the electronic communications media is in need. Whether the communications media is wired or wireless, both can be not protected from unauthorized reception or interception of transmission. The, method of transforming the original information into the unreadable format is called encryption and decryption of information. The study of encryption and decryption is known as Cryptography. This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133