Exploring Symmetric and Asymmetric Cryptographic Algorithms

Verified

Added on  2025/08/25

|3
|370
|217
AI Summary
Desklib provides solved assignments and past papers to help students understand complex topics like cryptography.
Document Page
INFORMATION SECURITY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cryptographic Techniques:
Cryptographic is a technique to convert plain text into cipher text and cipher text into plain text.
Cryptographic is a method of managing or transmitting and storing the data in a normal form in
which everyone can read in easy way and also process it. Cryptographic is one of the important
technologies which are used to build a secure and safe VPN (virtual private network). In this
technology, some basic concept related to data privacy is used for defining the cryptographic
algorithm.
Data privacy provides two types of encryption of the cryptographic algorithm.
1. Asymmetric cryptographic and
2. Symmetric cryptographic
Asymmetric cryptographic is also known as a public key and it is used to solve the problem of
exchanging by two types of a key in which it is used to encrypt the message. In this technique
encrypted messages may be decrypted by the other key. To secure the sending message through
this technique to encrypt the communication with receiver of the public key and provide private
key which is not be disclosed. Symmetric cryptographic is also known is conventional
cryptographic in which the sender and the receiver require sharing the key to keep secret the data
which is used to decrypt and encrypt the data. A hash function is also used in the cryptographic
technique in this algorithm no key is used and it is also used to encrypt the password in the
operating system.
In the cryptography technology, to convert plain text into cipher text and cipher text into plain
text one type of key is used that is secret or symmetric key and it is used for both process of
encryption and decryption. A public key or asymmetric key is used two types of key in which
one key is used for encryption and another key is used for decryption to convert plain text into
cipher text and cipher text into plain text. I the cryptographic technique hash function has no key
means in this process plain text converts into cipher text but cipher text is not converted into
plain text (Ogiela, 2016).
Document Page
Reference:
Ogiela, L. (2016). Cryptographic techniques of strategic data splitting and secure information
management. Pervasive and Mobile Computing, 29, 130-141.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]