Encryption and decryption using a secret key To secretly communicate with Bob, Alice encrypts her messages before sending them. There are many techniques (cryptographic algorithms) that she can use. All these algorithms have…
Read moreWhen using public key cryptography, Alice and Bob both have their own key pairs. A key pair consists of a public key and a private key. If the public key is used to…
Read moreCryptography is “Art of writing or hiding secret”. It is a science of protecting the information from theft or unauthorized access. To do so, important or confidential information is hided as or converted…
Read moreComputer security is an important field of study for most day-to-day transactions. It arises when we turn on our cellular phones, check our voice mail and e-mail, use debit or credit cards, order…
Read moreThe field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. That is a broad statement that covers a host…
Read more