KING'S IT WORLD
please register to watch content in detail
THANKS
ADMIN KINGSIT WORLD
KING'S IT WORLD
please register to watch content in detail
THANKS
ADMIN KINGSIT WORLD
KING'S IT WORLD
Would you like to react to this message? Create an account in a few clicks or log in to continue.

KING'S IT WORLD


 
HomeHome  GalleryGallery  SearchSearch  Latest imagesLatest images  RegisterRegister  Log inLog in  
Search
 
 

Display results as :
 
Rechercher Advanced Search
kings it world text ad
KINGSITWORLD CALENDAR
Follow me on G+
KINGSITWORLD WEATHER
Latest topics
» QURAN MAJEED KE TAFSEER
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeMon Aug 20, 2012 2:59 am by YOUSUFHALI

» PHY301 CIRCUIT THEORY REFERENCE BOOK
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeWed Jul 25, 2012 11:36 am by shabbir1915

» MTH202 ASSIGNMENT NO 3 SOLUVED
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeMon Jun 11, 2012 9:51 am by jaffarhussain

» Retrieve the DTC In the Jewel Module of 1995 Ford
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeThu May 31, 2012 11:51 am by obd2tool

» How you can Obvious the Check Engine Light on the
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeThu May 31, 2012 11:43 am by obd2tool

» send free sms and send free sms update on facebook
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeTue May 15, 2012 8:33 pm by rizwan269

» United Bank Limited (UBL) - Fee Deposit
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeThu May 10, 2012 3:33 pm by irumnaz

» PHOTO MIXER SOFTWARE
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeFri Apr 20, 2012 10:02 am by sacredwkb

» Entrepreneurship Survey
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeThu Mar 08, 2012 2:20 pm by Admin

» Fall 2011 Semester Result Announced
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeThu Mar 08, 2012 2:19 pm by Admin

Navigation
 Portal
 Index
 Memberlist
 Profile
 FAQ
 Search
kings it world text ad
Social bookmarking
Social bookmarking reddit      

Bookmark and share the address of KING'S IT WORLD on your social bookmarking website

Bookmark and share the address of KING'S IT WORLD on your social bookmarking website
visitors counter
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Image
Powered by website analytics technology.
Keywords
MGMT611 MGT502 assignment final 2011 term paper 2010 HRM611
kings it world text ad
FLAG COUNTER
free counters
LIVE TRAFFIC

 

 IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION

Go down 
AuthorMessage
Admin
Admin
Admin


Scorpio
Posts : 638
Points : 2155
Reputation : 19
Join date : 2010-05-15
Age : 36
Location : islamabad

IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Empty
PostSubject: IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION   IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION Icon_minitimeWed Dec 29, 2010 9:30 am

What are the steps involved in symmetric cryptography? Also explain key management in conventional cryptography using some example.

A:
Answer
1) Symmetric Cryptography
When one party wishes to communicate secured data with another and they both share
the same key for encrypting and decrypting the data, the process is known as symmetric
Cryptography.
The shared key is referred to as a symmetric key.
Because the same key is used to encrypt and decrypt the data with symmetric
cryptography, the decryption process is essentially a reversal of the encryption process.
STEPS INVOLVED IN SYMMETRIC CRYPTOGRAPHY:
Symmetric encryption involves the following steps:
1. The sender creates an encoded text message by encrypting the plaintext message
with a symmetric encryption algorithm and a shared key.
2. The sender sends the encoded text message to the recipient.
3. The recipient decrypts the encoded text message back into plaintext with a shared
key.
2) Conventional cryptography
In conventional cryptography, (also called secret-key or symmetric-key encryption),
one key is used both for encryption and decryption.

Key management in conventional cryptography:

Conventional encryption is very fast. It is especially useful for encrypting data that is not going anywhere. However, conventional encryption alone as a means for transmitting secure data can be quite expensive simply due to the difficulty of secure key distribution.
The expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks.
EXAMPLES:
Following are the examples of key management in conventional cryptography
1-The Data Encryption Standard (DES): is an example of a conventional crypto system that is widely employed by the Federal Government.

2-Captain Midnight's Secret Decoder Ring: (which is an "encoder" ring as well) is also an example of conventional cryptography which allows you to do a simple substitution encryption. It usually has two concentric wheels of letters, A through Z.

3-Julius Caesar's cipher : The Caesar cipher is named for Julius Caesar who used an alphabet with a left shift of three is also an example of conventional cryptography.
Back to top Go down
 
IT430 FALL 2010 ASSIGNMENT NO 2 SOLUTION
Back to top 
Page 1 of 1
 Similar topics
-
» cs201 assignment no 3 solution fall 2010
» MTH603 ASSIGNMENT NO 1 SOLUTION FALL 2010
» ISL201 ASSIGNMENT NO 2 SOLUTION FALL 2010
» CS610 ASSIGNMENT NO 3 SOLUTION FALL 2010
» MGT101 ASSIGNMENT SOLUTION FALL 2010

Permissions in this forum:You cannot reply to topics in this forum
KING'S IT WORLD :: EDUCATION :: ASSIGNMENTS-
Jump to: