For m.Tech describe the security techniques and crptographic algorithm in distributed systems
Answers
Explanation:
Encryption Algorithms
Cryptography is broadly classified into two categories: Symmetric key Cryptography and Asymmetric key Cryptography (popularly known as public key cryptography).
encryption algorithms-what is cryptography-edureka
Now Symmetric key Cryptography is further categorized as Classical Cryptography and Modern Cryptography.
Further drilling down, Classical Cryptography is divided into Transposition Cipher and Substitution Cipher. On the other hand, Modern Cryptography is divided into Stream Cipher and Block Cipher.
So, let’s understand these algorithms with examples.
How various Cryptographic Algorithms Works?
Let’s start with the Symmetric key encryption
Symmetric Key Cryptography
An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. The most popular symmetric–key system is the Data Encryption Standard (DES)
symmetric key-what is cryptography-edureka
Transposition Ciphers
In Cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.
That is, the order of the units is changed (the plaintext is reordered). Mathematically, a bijective function is used on the characters’ positions to encrypt and an inverse function to decrypt.
Answer:
DONT DO M.TECH
Explanation:
SIMPLE