- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1580 Articles
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
8K+ Views
Fermat's little theorem is a fundamental theorem in elementary number theory, which provides compute powers of integers modulo prime numbers. It is a specific case of Euler's theorem, and is essential in applications of elementary number theory, such as primality testing and public-key cryptography. This is referred to as Fermat’s ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
499 Views
AES encryption defines the phase of hiding electronic information using an approved 128-bit, 192-bit, or 256-bit symmetric encryption algorithm from the Advanced Encryption Standard (AES), also called a FIPS 197.In the 1990s, the US Government required to standardize a cryptographic algorithm which was to be used globally by them. It ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
9K+ Views
Groups, rings, and fields are the important elements of a branch of mathematics called as abstract algebra, or modern algebra. In abstract algebra, it is concerned with sets on whose elements and it can operate algebraically; that is, it can combine two elements of the set, perhaps in multiple ways, ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
316 Views
There are various component of DES which are as follows −Key Transformation − An initial 64-bit key is changed into a 56-bit key by discarding each 8th bit of the initial key. Therefore for each round, a 56 bit key is applicable. From this 56-bit key, there are several 48-bit ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
913 Views
EncryptionData encryption is a method of translating information from plaintext (unencrypted) to ciphertext (encrypted). Users can access encrypted information with an encryption key and decrypted information with a decryption key.There are large amounts of sensitive information handled and stored online in the cloud or on combined servers. Encryption needs cybersecurity ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
1K+ Views
There are various techniques of Monoalphabetic cipher which are as follows −Additive Cipher − Additive cipher is one method of changing a permutation of the letters of the alphabet. Each letter in the alphabet is cyclically changed by the equivalent amount and the relative order of the letters is kept ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
19K+ Views
The substitution cipher is the oldest forms of encryption algorithms according to creates each character of a plaintext message and require a substitution process to restore it with a new character in the ciphertext.This substitution method is deterministic and reversible, enabling the intended message recipients to reverse-substitute ciphertext characters to ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
13K+ Views
A poly-alphabetic cipher is any cipher based on substitution, using several substitution alphabets. In polyalphabetic substitution ciphers, the plaintext letters are enciphered differently based upon their installation in the text. Rather than being a one-to-one correspondence, there is a one-to-many relationship between each letter and its substitutes.For example, ‘a’ can ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
530 Views
IDEA stands for the International Data Encryption Algorithm. IDEA is a symmetric-key block cipher. It is denoted the same key can be used to encrypt the plaintext and decrypt the ciphertext.IDEA needed both the encrypting and decrypting parties to have a secret key that is different from a public-key and ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
5K+ Views
IDEA is a block cipher and it operates on 64bit plaintext and 128 bit key. IDEA is reversible like DES that is, the equivalent algorithm can be used for encryption and decryption. IDEA needs both diffusion and confusion for encryption.The 64-bit plaintext is divided into four portions of 16bit plaintext ... Read More