CSS Notes
CSS Notes
CSS Notes
Asymmetric key Cryptography is also called public key cryptography. In asymmetric key
cryptography two keys are used, one for encryption and another for decryption.
A public key is known to everyone and can be used to ecrypt messages and verify signatures.
The private key is known only to receiver of the message ot verifier ,used to decrypt messages
and sign (create) signatures example RSA , Diffie Hellman and Key exchange algorithm
monoalphabetic Cipher
In this cipher substitutes one letter of the alphabet with any random letter from the alphabet.
Polyalphabetic Cipher
Monoalphabetic cipher is easy to break however Polyalphabetic cipher uses more than one
alphabet and switches between them systematically.’
Module 2
ElGama Algorithm
ElGama cryptosystem called Elliptic Curve Variant, is based on the Discrete Logarithm Problem.
It derives the strength from the assumption that the discrete logarithms cannot be found in
practical time frame for a given number while the inverse operation of the process can be
computed efficiently
The generatio of an ELgama key pair is comparatively simpler than the equivalent process for
RSA. But the encryption and decryption are slightly more complex than RS
This algorithm takes an input of arbitrary length and 128 bit message digest is produced. The
input message is produced in 512 - bit blocks
What is Nmap?
Nmap is a tool which is used for finding networks and in security auditing.
Kerberos uses the concept of the ticket as a token to prove the identity of the
user. Kerberos uses the concept of a ticket as a token that proves the identity
of a user.
Digital Signature
RSA signature scheme: It is a block cipher which converts plain text into
cipher text at sender side and vice versa at receiver side