The science of cryptology is the science of secure communications, formed from the Greek words kryptós, "hidden", and logos, "word". During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Encryption is the science of changing data so that it is unrecognizable and useless to an unauthorized person. Decryption is changing it back to its original form. Data that can be read and understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called ciphertext. You use encryption to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting ciphertext to its original plaintext is called decryption.
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Donate To Maintain This Blog
Dear Readers,
Donate (INR 1/-)At-least To Maintain This ProjectsWorlds
Total Pageviews
Most Popular Posts
-
Leather Technology Seminar Topics And Project Topics Titles (B.tech/ B.E Leather Technology) List given Below are the Seminar Topics And pro...
-
This is a MBA International Business project report on Export Process and Documentation and was submitted in partial fulfillment of PG Diplo...
-
This is a B.Pharma Seminar and project report on Colonic Drug Delivery system. The colonic region of gastro intestinal tract become and incr...
-
NETWORK SECURITY STEGANOGRAPHY-ENCHANCING THE NETWORK SECURITY Steganography is the practice of encoding secret information in a...
-
A novel technique to enhance the security in symmetric key cryptography Cryptography is the science of keeping private information pr...
-
Title : Development of Modbus based Digital I/O Card with RS-485 Port for Industrial Applications Abstract: This is Electronics project repo...
-
The most modern telephone is the cellular telephone, or commonly called a cell phone. A cellular telephone is designed to give the ...
-
IMPLEMENTATION OF HAMMING-CUT-MATCHING ALGORITHM IN IRIS RECOGNITION This paper includes the implem...
-
Java is an entire programming language resembling C or C++. It takes a sophisticated programmer to create Java code. And it requires a so...
-
we are facing majority of crimes related to security issues and these arise due to the leakage of passwords or illegal authenticatio...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com