Answer)
Cryptography is the art of secret writing. In cryptography, the plain text is converted into non-human readable cipher text. There are 2 processes in cryptography such as encryption and decryption. Encryption means converting plain text to cipher text and decryption means converting the cipher text back to human readable and meaningful plain text. To make a message or content secure we apply cryptographic algorithms so that the message cannot be read or meaning cannot be understood by persons for which it is not meant to.
Only authorized persons will have the means of decrypting the cipher text back to plain text so that they can understand the meaning of it. When sending through an unsecured medium of transmission such as the internet cryptographic algorithms are used to secure the transfer of messages from the source to the destination.
There are generally 2 types of cryptographic techniques: symmetric key or private key cryptography and asymmetric key or public key cryptography. The private key cryptography means that a message has to be encrypted with a key from the sender to the receiver. The message will be encrypted using the key at the source and also be decrypted at the destination using the same key. Here the key sharing is the problem over the unsecured medium as much as message sharing. Thus there is a problem.
Another type of cryptography is the public key cryptography, where the sender and receiver have a public and private key. Here the public key is broadcasted while the private key is private to the party. Messages are encrypted with the receiver's public key, when the receiver receives the encrypted message the message is decrypted using the private key of the receiver.
Now the thing of the concern is if we could fake public keys, then we can pose to be another person and thus this will be an security issue. Here the security issue is overcome using a digital signature to identify the sender and the message. Then sender can combine the message with a private key to create a short digital signature on the message, and the intended receiver can combine a message, the digital signature which is received and the public key which is known to the public to verify that the signature was valid and thus the sender can be trusted. The authenticity of the message is kept authentic by the sender by the digital signature as the sender keeps the private key safe and secret. Changing the message or anything in the transmission will lead to a digital signature mismatch and thus we won't be able to fake it.
Hey guys! This is some homework I found from last year to help me prepare for...
Hey guys I need help with this assignment. However it contains 7 sub-problems to solve but I figured only 4 of them can be solved in one post so I posted the other on another question so please check them out as well :) Here is the questions in this assignment: Note: Two helper functions Some of the testing codes for the functions in this assignment makes use of the print_dict in_key_order (a dict) function which prints dictionary keyvalue pairs...
Hey guys, I need some help solving this problem. thank you very much in advance! Pontfolio Optimization Task 4 Suppose the shares of two different companies give you the same return on average. Does it make sense to distribute your money and buy some shares of each company? Or would it be better to invest all the money into only a single company? Common sense says: "distribute" Why? Let's see... What at all could we gain if the return is...
I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...