- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1040 Articles
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
2K+ Views
What is a Symmetric Key? A symmetric key is a type of cryptography in which the same secret key is used for both encrypting and decrypting a message. It is also referred to as a shared secret because both the sender and the recipient of the message must have the ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
13K+ Views
What is Symmetric Key Algorithms? Symmetric key algorithms are a type of cryptographic technique that uses a shared secret key for both encryption and decryption. This means that the same key is used to encode and decode the message. Symmetric key algorithms are generally faster and more efficient than asymmetric ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
10K+ Views
What is Cryptographic? Cryptography is the study of techniques for secure communication in the presence of third parties. It involves the use of mathematical algorithms and protocols to secure the confidentiality, integrity, and authenticity of communication. Cryptography is used in a wide range of applications, including securing communication over the ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
658 Views
What is Quantum Cryptography? Quantum cryptography is a field of study that focuses on the use of quantum mechanical phenomena, such as superposition and entanglement, to secure communication. Quantum cryptography involves the use of quantum states to encode and transmit information, and it is based on the principles of quantum ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
3K+ Views
Kerckhoff's principle, also known as Kerckhoff's law, is a principle in cryptography that states that a cryptographic system should be secure even if everything about the system, except for the key, is public knowledge. This principle is also sometimes referred to as "security through obscurity is not security." The principle ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
6K+ Views
What Is a Distributed Hash Table? A distributed hash table (DHT) is a type of distributed system that provides a lookup service similar to a hash table. In a hash table, data is stored and retrieved using keys, and the keys are used to determine the location of the data ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
8K+ Views
A peer-to-peer (P2P) network is a type of network in which each participant (or "peer") can act as both a client and a server, allowing them to share resources and information directly with one another without the need for a central server. P2P networks are decentralized, meaning that there is ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
738 Views
H.323 Protocol Explained H.323 is a set of standards for real-time communication over IP networks, such as the internet. It was developed by the International Telecommunication Union (ITU) in the late 1990s as a way to enable voice, video, and data communication over IP networks. H.323 is a suite of ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
3K+ Views
What is the Real-Time Communications (RTC)? Real-Time Communications (RTC) refers to the ability to communicate and exchange information in real time over the internet. RTC includes technologies and protocols that enable synchronous communication of audio, video, and other types of data between devices. RTC technologies are used in a wide ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
7K+ Views
What is the Real-time Transport Protocol (RTP)? Real-time Transport Protocol (RTP) is a network protocol for the delivery of audio and video over the internet. It is designed to provide end-to-end network transport functions suitable for applications transmitting real-time data, such as audio and video. RTP is used in conjunction ... Read More