Satish Kumar has Published 1040 Articles

Symmetric-Key Signatures

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:40:04

2K+ Views

What is a Symmetric Key? A symmetric key is a type of cryptography in which the same secret key is used for both encrypting and decrypting a message. It is also referred to as a shared secret because both the sender and the recipient of the message must have the ... Read More

Symmetric Key Algorithms

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:36:58

13K+ Views

What is Symmetric Key Algorithms? Symmetric key algorithms are a type of cryptographic technique that uses a shared secret key for both encryption and decryption. This means that the same key is used to encode and decode the message. Symmetric key algorithms are generally faster and more efficient than asymmetric ... Read More

Fundamental Cryptographic Principles

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:35:15

10K+ Views

What is Cryptographic? Cryptography is the study of techniques for secure communication in the presence of third parties. It involves the use of mathematical algorithms and protocols to secure the confidentiality, integrity, and authenticity of communication. Cryptography is used in a wide range of applications, including securing communication over the ... Read More

Quantum Cryptography

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:15:27

658 Views

What is Quantum Cryptography? Quantum cryptography is a field of study that focuses on the use of quantum mechanical phenomena, such as superposition and entanglement, to secure communication. Quantum cryptography involves the use of quantum states to encode and transmit information, and it is based on the principles of quantum ... Read More

Kerckhoff’s Principle

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:06:09

3K+ Views

Kerckhoff's principle, also known as Kerckhoff's law, is a principle in cryptography that states that a cryptographic system should be secure even if everything about the system, except for the key, is public knowledge. This principle is also sometimes referred to as "security through obscurity is not security." The principle ... Read More

Distributed Hash Tables (DHTs)

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:00:31

6K+ Views

What Is a Distributed Hash Table? A distributed hash table (DHT) is a type of distributed system that provides a lookup service similar to a hash table. In a hash table, data is stored and retrieved using keys, and the keys are used to determine the location of the data ... Read More

Peer to Peer Networks

Satish Kumar

Satish Kumar

Updated on 09-Jan-2023 17:58:58

8K+ Views

A peer-to-peer (P2P) network is a type of network in which each participant (or "peer") can act as both a client and a server, allowing them to share resources and information directly with one another without the need for a central server. P2P networks are decentralized, meaning that there is ... Read More

H.323 and Associated Protocols

Satish Kumar

Satish Kumar

Updated on 09-Jan-2023 17:49:23

738 Views

H.323 Protocol Explained H.323 is a set of standards for real-time communication over IP networks, such as the internet. It was developed by the International Telecommunication Union (ITU) in the late 1990s as a way to enable voice, video, and data communication over IP networks. H.323 is a suite of ... Read More

Real-Time Communications (RTC)

Satish Kumar

Satish Kumar

Updated on 09-Jan-2023 15:51:30

3K+ Views

What is the Real-Time Communications (RTC)? Real-Time Communications (RTC) refers to the ability to communicate and exchange information in real time over the internet. RTC includes technologies and protocols that enable synchronous communication of audio, video, and other types of data between devices. RTC technologies are used in a wide ... Read More

Real-Time Transport Protocol (RTP)

Satish Kumar

Satish Kumar

Updated on 09-Jan-2023 15:45:55

7K+ Views

What is the Real-time Transport Protocol (RTP)? Real-time Transport Protocol (RTP) is a network protocol for the delivery of audio and video over the internet. It is designed to provide end-to-end network transport functions suitable for applications transmitting real-time data, such as audio and video. RTP is used in conjunction ... Read More

Advertisements