--%>

Encryption

Explain the term Encryption.

E

Expert

Verified

Encryption: At the core of most security services are encryption algorithms. These are functions that take as input a stream of bits (plaintext) and produce an output (cipher text) that bears no resemblance to the input. The encryption algorithm is reversible hence an authorized party can take the output and recover the original input. This process is called decryption. Encryption/decryption algorithms by themselves are very difficult to keep secret, and if revealed would invalidate the algorithm for future use. Hence, modern algorithms also include a key which will determine exactly how the algorithm will work in a given situation. If the key is compromised a new key can be chosen and the same algorithm can be used.

The primary characteristic of an encryption algorithm (and the usual approach to attacking one) is that there are no repetitive patterns in the cipher text and that patterns in the cipher text can not be related to simi lar patterns in the plaintext. For example, consider the simple substitution codes, which offset the alphabet by a fixed number of characters. So that A maps to F, B maps to G, and so on wrapping around when it gets to the end so that Z maps to E. It turns out that the frequencies of certain letters in different languages are well known and can be used to break a code like this quite easily. Similar patterns can be found for pairs of characters, etc. So a good encryption algorithm must try to mask the patterns that are inherent in the plaintext.

Encryption algorithms are classified into two broad categories-symmetric and asymmetric. These two categories differ in the number of different keys used, the operations performed, and the algorithm efficiency.

   Related Questions in Computer Network Security

  • Q : Design considerations List significant

    List significant design considerations for the stream cipher.

  • Q : Function areas of IP security Specify

    Specify various function areas of the IP security?

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : Advances of LAN Security Setup Advances

    Advances of LAN Security Setup: The company should use firewall in order to separate the wireless Local Area Network. A gateway/ firewall is used in order to separate the wireless and wired networks. This helps to screen the traffic in wired network.

  • Q : Operations in Blowfish Explain the

    Explain the primitive operations which are used in the Blowfish?

  • Q : What is realm In the context of

    In the context of Kerberos, what is meant by the term realm?

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : Headers fields in MME Explain the

    Explain the headers fields which are defined within the MME?

  • Q : Mono-alphabetic and Playfair cipher

    Define: a) Mono-alphabetic cipher b) Playfair cipher c) Transposition cipher

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,