The first element that comes to mind when a person thinks about computer security is cryptography. Cryptography is the process of converting an information-bearing message to something that appears to be completely unintelligible “gibberish,” or performing the inverse process (decoding a cryptographically protected message). These processes are referred to as encryption and decryption, respectively. There are two basic forms of cryptographic processes-symmetric, in which the same key is used to encrypt and decrypt a message, and asymmetric, in which the key employed to encrypt a message is different from the key employed to decrypt the message. A cryptographic encryption process consists of an algorithm, such as the data encryption standard three times (triple DES), advanced encryption standard (AES) or a host of others, that takes an input string of characters or numbers (the information we wish to protect) and converts the string to “gibberish.” In order to do so, it must be set to a predictable initial state, and it requires an encryption key. As explained above, in symmetric key cryptography the same key is used to encrypt and decrypt a file. Asymmetric cryptography uses different keys for encryption and decryption and so employs a more complex algorithm. This difference gives symmetric key cryptography an advantage of faster processing and therefore less computing overhead. There are issues with symmetric key cryptography, however.
Note: Do Not Use Any eBook Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.
Size: 10.7 MB