- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1580 Articles
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
4K+ Views
Hashing is the procedure of translating a given key into a code. A hash function can be used to substitute the data with a newly generated hash code. Hash algorithms are generally used to offer a digital fingerprint of a file’s contents often used to provide that the file has ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
3K+ Views
Public key cryptography is an encryption method that needs a paired public and private key (or asymmetric key) algorithm for secure data communication. Public-key cryptography is also called an asymmetric cryptography. It is a form of cryptography in which a user has a pair of cryptographic keys including public key ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
423 Views
A stream cipher is an approaches of encryption where a pseudorandom cipher digit stream is mixed with plain text digits. This pseudorandom cipher digit stream is used to each binary digit, one bit at a time. This approach of encryption uses an infinite number of pseudorandom cipher digits per key.A ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
17K+ Views
Symmetric key cryptography is a type of encryption scheme in which the similar key is used both to encrypt and decrypt messages. Such an approach of encoding data has been largely used in the previous decades to facilitate secret communication between governments and militaries.Symmetric-key cryptography is called a shared-key, secret-key, ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
225 Views
There are several algorithms of cryptographic which are as follows −Symmetric key Cryptography − In symmetric key cryptography, an individual key is used for both encryption and decryption. The sender needs the key (or some group of rules) to encrypt the plaintext and sends the cipher text to the receiver. ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
1K+ Views
A digital signature is a numerical technique which validates the authenticity and integrity of a message, software or digital files. It enables us to test the author name, date and time of signatures, and authenticate the message contents. The digital signature provides far more inherent security and intended to solve ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
325 Views
A Digital Certificate is an electronic "password" that enables a person, organization to transfer data securely over the web using the public key infrastructure (PKI). Digital Certificate is also referred to as public key certificate or identity certificate.Digital certificates play an essential role in maintaining online commerce safe. If the ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
193 Views
There are three technologies that supports imperative levels of protection against unknown attacks such as software fault isolation, intrusion detection through program analysis, and fine-grained mandated access controls.These technologies distribute an imperative feature: they do not based on the efficient operation of the programs; rather than, they provide a secondary ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
910 Views
A digital certificate is an electronic "password" that enables a person, organization to exchange data securely over the web using the public key infrastructure (PKI). Digital Certificate is also called a public key certificate or identity certificate.A digital signature is a numerically generated code that validates the authenticity of a ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
5K+ Views
There are various applications of cryptography which are as follows −Secrecy in Transmission − Some existing secrecy systems for transmission access a private key system for converting transmitted data because it is the quickest approach that functions with rational guarantee and low overhead.If the multiple conversing parties is minute, key ... Read More