26-06-2010, 07:52 AM
I am G.J.MANIGANDAN, i need a powerpoint description of encrption and decryption, and pdf notes about the encryption and decryption technology.
26-06-2010, 07:52 AM
I am G.J.MANIGANDAN, i need a powerpoint description of encrption and decryption, and pdf notes about the encryption and decryption technology.
21-09-2010, 09:53 AM
hi
you can read more about ENCRYPTION AND DECRYPTION from the following links https://seminarproject.net/Thread-encryp...ull-report https://seminarproject.net/Thread-wirele...decryption
09-10-2012, 05:39 PM
ENCRYPTION AND DECRYPTION
ENCRYPTION.docx (Size: 74.06 KB / Downloads: 34) Introduction The title of our project is “ENCRYPTION AND DECRYPTION”. This project encrypts and decrypts the text by using cryptographic algorithm. Encryption and Decryption is a strong text and file encryption software for personal and professional security. Cryptography is the science of information security. The word is derived from the Greekkryptos, meaning hidden. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plain text(ordinary text, sometimes referred to as clear text) into cipher text (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. Brief Literature Survey In recent times, cryptography has turned into a battleground of some of the world's best mathematicians and computer scientists. The ability to securely store and transfer sensitive information has proved a critical factor in success in war and business. Because governments do not wish certain entities in and out of their countries to have access to ways to receive and send hidden information that may be a threat to national interests, cryptography has been subject to various restrictions in many countries, ranging from limitations of the usage and export of software to the public dissemination of mathematical concepts that could be used to develop cryptosystems. However, the Internet has allowed the spread of powerful programs and, more importantly, the underlying techniques of cryptography, so that today many of the most advanced cryptosystems and ideas are now in the public domain. Today's cryptography is vastly more complex than its predecessor. Unlike the original use of cryptography in its classical roots where it was implemented to conceal both diplomatic and military secrets from the enemy, the cryptography of today, even though it still has far-reaching military implications, has expanded its domain, and has been designed to provide a cost-effective means of securing and thus protecting large amounts of electronic data that is stored and communicated across corporate networks worldwide. Cryptography offers the means for protecting this data all the while preserving the privacy of critical personal financial, medical and e-commerce data that might end up in the hands of those who shouldn’t have access to it. |
|