Professional Documents
Culture Documents
CNS-4,5,6 Session
CNS-4,5,6 Session
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Plain Text
Cipher Text
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext:ZICVTWQNGRZGVTWAVZHCQ
YGLMGJ
January = 1071, February = 682, March = 1353, April = 154, May = 1335, June =
1046, July = 1047
August = 168
Predict the Cipher text for September?
1. Encryption (Encipherment)
It is the process of encoding information into a secret
code by using a special key.
To read an encrypted file, you must have the key of the
decoding that enables you to decrypt it.
By using an algorithm for encryption we can protect our
personal information that we don’t want other people to
see such as:
- Credit-card information
- Bank-account information
- Medical information
2. Digital Signature
A digital signature is basically a way to ensure that an
electronic document is authentic. Authentic means that
you know who created the document and that it has not
been altered.
These (fast)
functions analyze a
message and
produce a fixed
length digest which
is practically unique.
It is used to create a
signature for a
message which can
be used to verify its
integrity
4. Access Control
Access control is way of talking about controlling access
to a web resource. Access can be granted or denied based
on a wide variety of criteria, such as the network address
of the client, the time of day, or the browser which the
visitor is using.