Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 204 |Likes:
Published by Bridget Smith
One of the Methods to secure the information is Cryptography. Controls to protect data transmitted over the lines, is mainly through appropriate Encryption techniques
One of the Methods to secure the information is Cryptography. Controls to protect data transmitted over the lines, is mainly through appropriate Encryption techniques

More info:

Published by: Bridget Smith on Nov 16, 2009
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





Y.LAKSHMI CHAITANYA,IVC.S.EEMAIL ID: goodday_4u2002@yahoo.co.in
In the real world, to provide securities there are four areasThey are:ConfidentialityAuthenticationIntegrityNon repudiation.
The universal technique for providing confidentiality of transmitted data iscryptography. Cryptography is the one branch that deals with encryption anddecryption.
There are two types of hash algorithms. They are:. MD5SHA-1
Due to the advancement in computing power and hash function crypt-analysis haveled to the decline in the popularity of MD4 and MD5, two very popular hashfunctions. In response, newer hash algorithms have been developed with longer hashcode length and with features designed to resist specific crypt-analytic attacks
 E-commerce on the worldwide web is a rapidly growing and proliferatingfield. But there are several differences between commerce in the real world and on theInternet, and perhaps the most fundamental issue is that of trust and security. In orderto build secure E-commerce applications, we need to establish a definition of varioussecurity requirements.The following four areas have been identified as the framework for secure E-commerce:
Confidentiality: Protecting the data from all but the intended receiver(s).
Authentication: Proving one's identity.
Integrity: Ensuring no unauthorized alteration of data.
Non-repudiation: Preventing an entity from denying previouscommitments or actions.The basic functionality of cryptography is to hide information. Its operation typicallyincludes two processes:
Encryption as the process of transforming information so that it isunintelligible to an intruder, and
Decryption as the process of transforming the encrypted information sothat it is intelligible again.The following figure illustrates these processes.
The information in its original form is known asplain text, and theencrypted message is calledcipher text.
Exchanging or choosing a key pair (e, d) secretly doessecurecommunicationbetween two persons.
The security lies in the fact that the mathematical function and the keyare only bound to the sender and receiver, not to anybody else.
Keys are very critical to the functionality of cryptographic algorithmsand it is sound cryptographic practice to change keys frequently.There are 2 important hash functions:

Activity (10)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
deepakbhatt21 liked this
Pruthvi Razz liked this
Sandipan Maitra liked this
sportythieve liked this
g.sawainya liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->