In recent years, cyber attacks on public and private organizations have grown exponentially. These attacks come from multiple sources such as organized crime, industrial espionage … that seek to obtain economic advantages for the information they obtain or damage the trust of customers and citizens by revealing confidential information. The cryptography is a security measure to prevent disclosure of sensitive information by making it unintelligible to unauthorized persons. What is cryptography in network security
The cryptography is a method of storing and transmitting data so that only those who are authorized to do so can read and process them . It is considered as a science of information security, encoding it in a non-readable format . It is an effective way to protect sensitive information for storage and transmission over public networks.
The main objective of cryptography, and the mechanisms that make it possible, is to hide information from unauthorized individuals . However, with enough time, resources, and motivation, hackers are capable of attacking and breaking many cryptosystems and decrypting the encoded information. For this reason, the most realistic purpose of this science is to hinder the activity of attackers, increasing the work and time necessary to break the system.
Cryptography ensures:
There are therefore different elements and types of cryptography that must be understood as the technique that allows a message to be encrypted so that it is unreadable to anyone who does not know the encryption system.
Main Difference - Summary vs Conclusion Summary and conclusion are two terms that are often…
Difference between moth and butterfly fall into two categories: anatomical and behavioral. Most moths are…
An engineer is a person whose job is to design and build engines, machines, roads,…
Internet is the term used to identify the massive interconnection of computer networks around the…
A CD-R is a type of disc that does not contain any data. It is blank…
Computing technologies are constantly evolving, and if we base our predictions on Moore's Law, they…