www.cryptographynotes.org Open in urlscan Pro
172.217.16.211  Public Scan

Submitted URL: http://stepuptocrypt.blogspot.co.at/
Effective URL: https://www.cryptographynotes.org/p/home.html
Submission: On May 05 via api from US — Scanned from AT

Form analysis 0 forms found in the DOM

Text Content

HOME

Recommended Posts:

RC4 Algorithm








 Please provide your queries regarding the Information Security syllabus here
and I will definitely post its answer. 

To see the notes provided on this website, navigate the menu bar given on the
left.












Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe
zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit
Messwerten zur Leistung und Sicherheit für Google freigegeben. So können
Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die
Qualität des Dienstes gewährleistet werden.Weitere InformationenOk


INFORMATION SECURITY NOTES


PROVIDING LECTURE NOTES ON INFORMATION SECURITY, THE TOPICS IT COVERS ARE
CLASSIC CRYPTO, SYMMETRIC CRYPTOGRAPHY, ASYMMETRIC CRYPTOGRAPHY, HASH FUNCTIONS,
ENCRYPTION, DECRYPTION, DIGITAL SIGNATURE, DIGITAL CERTIFICATE, ETC.. COPYING
THE CONTENT HAS BEEN BLOCKED. IF YOU NEED THE CONTENT COPIED, PLEASE SUBSCRIBE
TO GET THE NOTES AVAILABLE IN YOUR EMAIL DIRECTLY.

Sidebar
 * Classic
 * Flipcard
 * Magazine
 * Mosaic
 * Sidebar
 * Snapshot
 * Timeslide

Pages
 * Home
 * Privacy Policy
 * About
 * Symmetric (Private) Cryptography
 * RC4 Algorithm




PROS AND CONS OF SYMMETRIC KEY CRYPTOGRAPHY


MORE ABOUT DATA ENCRYPTION STANDARD (DES) AND ADVANCED ENCRYPTION STANDARD (AES)

2


ADVANCED ENCRYPTION STANDARD (AES)


DATA ENCRYPTION STANDARD (DES) ALGORITHM

3


FEISTEL CIPHER

1


RC4 ALGORITHM (SYMMETRIC STREAM CIPHER)

8


A QUICK GLOSSARY OF COMMON TERMS USED IN INFORMATION SECURITY (CRYPTOGRAPHY)


LINEAR FEEDBACK SHIFT REGISTER WITH EXAMPLE


A5/1 SYMMETRIC CRYPTOGRAPHY ALGORITHM

1


WHAT HAPPENS IF THE KEYSTREAM REPEATS? DOES IT HAMPER SECURITY?


XOR LOGIC

1


SYMMETRIC (SECRET KEY/PRIVATE KEY) CRYPTOGRAPHY

7


MODERN CRYPTOGRAPHY AND ITS TYPES

1


CLASSIC CIPHERS (PART 2)


CRYPTO BASICS

1


INFORMATION SECURITY GOALS

1


INFORMATION SECURITY BASICS

10
Apr
29



PROS AND CONS OF SYMMETRIC KEY CRYPTOGRAPHY


PROS AND CONS OF SECRET KEY CRYPTOGRAPHY






ADVANTAGES OF SECRET KEY CRYPTOGRAPHY

 1. It can be extremely secure.
 2. It is relatively easy than public key encryption.
 3. Since the system only needs to perform a single, reversible mathematical
    equation to encrypt or decrypt a file, the process is almost transparent.
 4. It is extremely fast.
 5. A different secret key is used for communication with every different party.
    Only the messages between a particular pair of sender and receiver are
    affected if a key is compromised. Communications with other people are still
    secure.       


DISADVANTAGES OF SECRET KEY CRYPTOGRAPHY

 1. The biggest problem with symmetric key encryption is that you need to have a
    way to share the key to the party with whom you are sharing data. Encryption
    keys aren't simple strings of text like passwords. They are essentially
    blocks of gibberish.
 2. The number of keys required for communication among parties is too large as
    a different secret key is used for communication with every different party.
 3. Cannot provide digital signatures that cannot be repudiated.




Thank you for reading :)
Now It's Your Turn!

I hope you liked my notes on Information Security. If yes, please share the link
with your friends to help them as well.

Also, I want to hear from you:

Which part of the post do you find most understandable?

Which part of the post do you want to be improved?

Please let me know by leaving a quick comment.





Posted 29th April 2021 by POOJA BAJAJ


0


ADD A COMMENT



Popular Posts
Popular Posts
 * Pros and Cons of Symmetric Key Cryptography
   Pros and Cons of Secret Key Cryptography Advantages of Secret Key
   Cryptography It can be extremely  secure. It is relatively  easy  than pub...
   
 * More about Data Encryption Standard (DES) and Adva...
   More about Data Encryption Standard (DES) and Advanced Encryption Standard
   (AES) Data Encryption Standard (DES) DataEncryption Standar...
   
 * RC4 Algorithm (Symmetric Stream Cipher)
   RC4 Algorithm (Symmetric Stream Cipher) RC4 is a symmetric key cryptographic 
   algorithm. It was created by Ronald Rivest which is why it...
   
 * Symmetric (Secret Key/Private Key) Cryptography
   Symmetric (Secret Key/Private Key) Cryptography Symmetric Cryptography
   Symmetric Cryptography, also known as Secret Key Cryptography, ...
   
 * Advanced Encryption Standard (AES)
   Advanced Encryption Standard (AES) A brief history: The Advanced Encryption
   Standard (AES) is formal encryption method adopted by the ...
   


Picture
Picture


About Me
About Me
POOJA BAJAJ

Labels
Labels
 * a5/1 algorithm2
 * algorithm1
 * asymmetric cryptography3
 * authentication1
 * availability1
 * avalanche effect1
 * block cipher3
 * CIA Triad1
 * cipher3
 * ciphertext4
 * codebook cipher1
 * confidentiality1
 * confusion1
 * cryptanalysis2
 * crypto1
 * cryptography6
 * cryptology2
 * decryption2
 * diffusion1
 * encryption3
 * encryption glossary1
 * feistel cipher1
 * Goals of information security1
 * hash function1
 * in depth encryption1
 * information security3
 * integrity1
 * key1
 * Key Scheduling Algorithm2
 * keystream2
 * linear feedback shift register2
 * message digest1
 * non repudiation1
 * one time pad1
 * plaintext1
 * private key2
 * pseudo-random generation algorithm1
 * public key cryptography1
 * RC4 Algorithm1
 * secret key2
 * shift register2
 * symmetric cryptography8
 * threat to information1
 * vernam cipher1
 * XOR gate with example1


Archive
Archive
 * 20211
   * April1
     * Pros and Cons of Symmetric Key Cryptography
 * 201916
   * July2
   * March1
   * February5
   * January8

Loading

Powered by Blogger.