Share
A Cryptographic Model for Cyber Security Applications
Subodh Kumar
(Author)
·
Ary Publisher
· Paperback
A Cryptographic Model for Cyber Security Applications - Kumar, Subodh
Choose the list to add your product or create one New List
✓ Product added successfully to the Wishlist.
Go to My Wishlists
Origin: U.S.A.
(Import costs included in the price)
It will be shipped from our warehouse between
Monday, June 17 and
Friday, June 28.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.
Synopsis "A Cryptographic Model for Cyber Security Applications"
The word Cryptography originated from the Greek Word "Secret writing. Cryp-tography is basically the science of securing data using algebraic relationships so that ordinary data can be altered into unintelligible text. Cryptography helps in storing confidential or sensitive information or transmitting it over the communi-cation network in such a way that only authorized can access or use it. The input data or information provided by the user is called as "Plaintext" while the altered or encrypted information is called as "Ciphertext". Ciphertexts are generated with the combination of plaintexts and keys while retrieving the information back to the original form is called decryption. About 3000 B.C, first time cryptography was used in Egypt, where pictograms were used on a stele. But in the 19th century discovery of Rosetta stone helped in revealing the information which was used on pictograms. Further, scytale cipher was originated where a parchment strip was wrapped around a cylinder where data is rearranged. But the information was re-vealed by wrapping the parchment strip. In the first century B.C, a new encryption
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.
✓ Producto agregado correctamente al carro, Ir a Pagar.