10. COMPARISION
SYMMETRIC KEY
CRYPTOGRAPHY
• The same algorithm with the same
key is used for the encryption and
decryption.
• The key must be kept secret.
• It may be impossible or at least
impractical to decipher a message if
no other information is available.
ASYMMETRIC KEY
CRYPTOGRAPHY
• One algorithm is used for
encryption and decryption with the
pair of keys one for encryption and
one for decryption.
• One of the two key must be kept
secret.
• It may be impossible or at least
impractical to decipher a message if
no other information is available.
11. APPLICATIONS
• Defense service
• E – commerce
• Business transactions
• Internet payment system
• User identification system
• Access control
• Data Security
12. CONCLUSION
•By using of CRYPTOGRAPHY technique a
fair unit of confidentiality ,authentication
,integrity access control and availability of
data is maintained.