3. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
4. Data encryption and Decryption
Encryption – The process of converting plain text message
into unintelligible format in known as encryption .
5. Decryption : The process of converting
unreadable message i.e cipher text into
plain text is called data decryption.
6. There are two types of technique used for
encryption i.e
1.Substitution :
In this we substitute each character to any other character or
number or special character .
1.Transposition :
In this we substitute each character to any
other character and change the position of character .
7. Symmetric key Cryptography
In this we use only one key for both
encryption and decryption of data.
There are various algorithms such as DES,
Triple
DES,RC4,RC5,Blowfish,Twofish….etc.
17. Asymmetric Key Algorithm
Public-key cryptography, also known as asymmetric cryptography, is a class of
cryptographic algorithms which requires two separate keys, one of which is secret (or
private) and one of which is public. Although different, the two parts of this key pair are
mathematically linked.
20. Five Basic steps for calculation :
Large Prime Number Generation: Two large
prime numbers p and q need to be generated.
These numbers are very large: At least 512 digits,
but 1024 digits is considered safe.
Modulus: From the two large numbers, a
modulus n is generated by multiplying p and q.
Totient: The totient of n,ϕ(n) is calculated.
21. Public Key: A prime number is calculated from
the range [3,ϕ(n)) that has a greatest common
divisor of 1 with ϕ(n).
Private Key: Because the prime in step 4 has a
gcd of 1 with ϕ(n), we are able to determine it's
inverse with respect to mod ϕ(n).
22. There are various application of cryptography in our day to day life .
One of is “BitCoin”
Bitcoin uses peer-to-peer technology to operate with no central
authority or banks; managing transactions and the issuing of
bitcoins is carried out collectively by the network.
Bitcoin is open-source; its design is public, nobody owns or
controls Bitcoin and everyone can take part.
Through many of its unique properties, Bitcoin allows exciting
uses that could not be covered by any previous payment system.
Bitcoin is a form of digital currency, created and held
electronically. No one controls it. Bitcoins aren’t printed, like
dollars or euros – they’re produced by people, and increasingly
businesses, running computers all around the world, using
software that solves mathematical problems.
23. How does Bitcoin work?
From a user perspective, Bitcoin is nothing more than a mobile app or
computer program that provides a personal Bitcoin wallet and enables a
user to send and receive bitcoins.
Behind the scenes, the Bitcoin network is sharing a massive public ledger
called the "block chain". This ledger contains every transaction ever
processed which enables a user's computer to verify the validity of each
transaction. The authenticity of each transaction is protected by digital
signatures corresponding to the sending addresses therefore allowing all
users to have full control over sending bitcoins.
Thus, there is no fraud, no chargebacks and no identifying information that
could be compromised resulting in identity theft. To learn more about
Bitcoin, you can consult the original Bitcoin whitepaper, read through the
extremely thorough Frequently Asked Questions, listen to a Bitcoin
podcast or read the latest Bitcoin news.