ENCRYPTION AND DECRYPTION
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
gjmanigandan
Active In SP
**

Posts: 1
Joined: Jun 2010
#1
26-06-2010, 07:52 AM


I am G.J.MANIGANDAN, i need a powerpoint description of encrption and decryption, and pdf notes about the encryption and decryption technology.
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#2
21-09-2010, 09:53 AM

hi
you can read more about ENCRYPTION AND DECRYPTION from the following links

topicideashow-to-encryption-decryption-full-report
topicideashow-to-wireless-encryption-and-decryption
Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#3
09-10-2012, 05:39 PM

ENCRYPTION AND DECRYPTION


.docx   ENCRYPTION.docx (Size: 74.06 KB / Downloads: 28)

Introduction

The title of our project and implimentation is “ENCRYPTION AND DECRYPTION”. This project and implimentation encrypts and decrypts the text by using cryptographic algorithm. Encryption and Decryption is a strong text and file encryption software for personal and professional security.
Cryptography is the science of information security. The word is derived from the Greekkryptos, meaning hidden. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plain text(ordinary text, sometimes referred to as clear text) into cipher text (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers.

Brief Literature Survey

In recent times, cryptography has turned into a battleground of some of the world's best mathematicians and computer scientists. The ability to securely store and transfer sensitive information has proved a critical factor in success in war and business.
Because governments do not wish certain entities in and out of their countries to have access to ways to receive and send hidden information that may be a threat to national interests, cryptography has been subject to various restrictions in many countries, ranging from limitations of the usage and export of software to the public dissemination of mathematical concepts that could be used to develop cryptosystems. However, the Internet has allowed the spread of powerful programs and, more importantly, the underlying techniques of cryptography, so that today many of the most advanced cryptosystems and ideas are now in the public domain.
Today's cryptography is vastly more complex than its predecessor. Unlike the original use of cryptography in its classical roots where it was implemented to conceal both diplomatic and military secrets from the enemy, the cryptography of today, even though it still has far-reaching military implications, has expanded its domain, and has been designed to provide a cost-effective means of securing and thus protecting large amounts of electronic data that is stored and communicated across corporate networks worldwide. Cryptography offers the means for protecting this data all the while preserving the privacy of critical personal financial, medical and e-commerce data that might end up in the hands of those who shouldn’t have access to it.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  matlab code for image encryption using elliptic curve cryptography Guest 1 52 29-10-2016, 02:34 PM
Last Post: Dhanabhagya
  matlab coding for image encryption using blowfish algorithm Guest 1 57 01-07-2016, 11:41 AM
Last Post: Dhanabhagya
  matlab code for rc4 encryption algorithm Guest 1 157 12-04-2016, 02:42 PM
Last Post: mkaasees
  activity diagram for file encryption and decryption Guest 1 94 30-01-2016, 02:28 PM
Last Post: mkaasees
  a dynamic secret based encryption scheme for smart grid wireless communication ppt Guest 0 64 03-01-2016, 07:37 PM
Last Post: Guest
Tongue elgamal encryption algorithm code in matlab Guest 0 61 16-12-2015, 12:41 AM
Last Post: Guest
  ppt on reliable re encryption in unreliable clouds Guest 0 51 14-12-2015, 12:28 AM
Last Post: Guest
Video authentication of digital images by encryption and decryption with primary key Guest 0 55 09-12-2015, 08:26 PM
Last Post: Guest
  genetic algorithm encryption and code breaking ppt Guest 0 59 09-12-2015, 02:02 PM
Last Post: Guest
  matlab code for rc4 encryption algorithm Guest 1 88 19-11-2015, 02:58 PM
Last Post: mkaasees