Professional Documents
Culture Documents
Security Algorithm
Security Algorithm
Security Algorithm
Introduction
In this age of universal electronic connectivity of virus & hackers, electronic fraud, there
is indeed no time at which security does not matter. For securing the environment of
electronic connectivity, two tends have came together for network security
1:-- the explosive growth in computer and their interconnection via network
With use of this algorithm you can easily encrypt any message, this algorithm helps to
minimizing the effort, required to encrypt any type of message. The user of this
algorithm can easily encrypt the message in minimum time
---Purpose
---Scope
---Definition
Purpose
The purpose of this document is to describe the requirements, both functional and
performance based for my cryptography algorithm or security algorithm. This document
will give both the general overview and specific information related to the algorithm and
the user.
Scope
Cryptography algorithm is an application. This application will encrypt any message and
will be used by:
---It can be used for the secure communication between many firms and organization
So that our data is more secure over the internetwork (internet) and the process of the
data transfer is more convenient and more secure
Definition
Cryptography
Cryptography is taken from a greek word kryptos + graph
Cryptography is the practice and study of hiding information .Cryptography prior to the
modern age was almost synonymous with encryption, the conversion of information
from readable to nonsense.
CRYPTOANALYSIS
Cryptoanalysis is the term used for the study of any method of obtaining the meaning of
encrypted information without access to the key, Normally we required to the key to
access the plain text from the cipher text i.e. it is the study of how to crack the
encryption algorithm or their implementation.