THE CRYPTOGRAPHY GUIDE
| |
Cryptographic Algorithms
DES This is the 'Data Encryption Standard'. This is a cipher that operates on 64-bit blocks of data, using a 56-bit key. It is a 'private key' system. Further Details on the DES Algorithm RSA RSA is a public-key system designed by Rivest, Shamir, and Adleman. Further Details on the RSA Algorithm HASH A 'hash algorithm' is used for computing a condensed representation of a fixed length message/file. This is sometimes known as a 'message digest', or a 'fingerprint'.. MD5 MD5 is a 128 bit message digest function. It was developed by Ron Rivest. Further Details on the MD5 Algorithm AES This is the Advanced Encryption Standard (using the Rijndael block cipher) approved by NIST. SHA-1 SHA-1 is a hashing algorithm similar in structure to MD5, but producing a digest of 160 bits (20 bytes).Because of the large digest size, it is less likely that two different messages will have the same SHA-1 message digest. For this reason SHA-1 is recommended in preference to MD5. HMAC HMAC is a hashing method that uses a key in conjunction with an algorithm such as MD5 or SHA-1. Thus one can refer to HMAC-MD5 and HMAC-SHA1 |
skip to main |
skip to sidebar
Pages
THE WORLD OF COMPUTER TECHNOLOGY
Friday, 12 July 2013
Cryptographic Algorithms
Blog Archive
-
▼
2013
(25)
-
▼
July
(15)
- HOW TO CREAT BACKDOOR IN WINDOW SEVEN
- Using Wine In Red Hat Linux
- To Password Protect Folders with Folder Protector?
- RSA Algorithm Example
- Cryptographic Algorithms
- Windows XP Network configuration
- Network configuration in Linux
- OOPs Concepts
- Setup The Timezone
- Cluster configuration
- List of web browsers
- A Comparison of Network Models
- CLOUD COMPUTING
- Basic Linux Commands
- STEGANOGRAPHY
-
▼
July
(15)
About Me
Sample Text
Sample Text
Sample text
You can replace this text by going to "Layout" and then "Page Elements" section. Edit " About "
Cryptographic Algorithms
Posted by HEMANT KUSHWAHA at 04:07 Friday, 12 July 2013
THE CRYPTOGRAPHY GUIDE
| |
Cryptographic Algorithms
DES This is the 'Data Encryption Standard'. This is a cipher that operates on 64-bit blocks of data, using a 56-bit key. It is a 'private key' system. Further Details on the DES Algorithm RSA RSA is a public-key system designed by Rivest, Shamir, and Adleman. Further Details on the RSA Algorithm HASH A 'hash algorithm' is used for computing a condensed representation of a fixed length message/file. This is sometimes known as a 'message digest', or a 'fingerprint'.. MD5 MD5 is a 128 bit message digest function. It was developed by Ron Rivest. Further Details on the MD5 Algorithm AES This is the Advanced Encryption Standard (using the Rijndael block cipher) approved by NIST. SHA-1 SHA-1 is a hashing algorithm similar in structure to MD5, but producing a digest of 160 bits (20 bytes).Because of the large digest size, it is less likely that two different messages will have the same SHA-1 message digest. For this reason SHA-1 is recommended in preference to MD5. HMAC HMAC is a hashing method that uses a key in conjunction with an algorithm such as MD5 or SHA-1. Thus one can refer to HMAC-MD5 and HMAC-SHA1 |
Subscribe to:
Post Comments (Atom)
Blogroll
Blogger templates
Blogroll
Blogger news
Blogger templates
Blogger news
Powered by Blogger.
Social Icons
Social Icons
-
List of web browsers History:- This is a table of personal computer web browsers by year of release of major version, in ch...
-
CISCO ROUTER SERIES The industry’s most widely deployed universal services aggregation router for enterprise and service provider ...
-
A Comparison of Network Models There are two network models that describe how networks 'work'. The OSI Model , the older model,...
-
Windows XP Professional Windows XP TCP/IP configuration panel. Click Start -> Control Panel -> Network Connections. Alternatel...
-
Step 1. Select folders for protect Copy Folder Protector (lockdir.exe) to the folder you want to protect or drag and drop th...
-
Using Wine In Red Hat Linux Wine is a great tool for Linux users who want to install and run Windows ...
-
CREAT BACKDOOR :::::::::::::::::::::::::::::::::::::::::::::::::::::::::...
-
OOPs – Object Oriented Programming System Object-oriented programming (OOP) is a programming paradigm that uses “Objects “and the...
-
Basic Concept of VLAN VLAN(Virtual Local Area Network)What is this VLAN ? Why we are using VLAN? How to configure VLAN? all is explain...
-
Cloud computing allows people to connect to their important information anywhere and at any time. This capability is influencing our...
Blog Archive
-
▼
2013
(25)
-
▼
July
(15)
- HOW TO CREAT BACKDOOR IN WINDOW SEVEN
- Using Wine In Red Hat Linux
- To Password Protect Folders with Folder Protector?
- RSA Algorithm Example
- Cryptographic Algorithms
- Windows XP Network configuration
- Network configuration in Linux
- OOPs Concepts
- Setup The Timezone
- Cluster configuration
- List of web browsers
- A Comparison of Network Models
- CLOUD COMPUTING
- Basic Linux Commands
- STEGANOGRAPHY
-
▼
July
(15)
0 comments:
Post a Comment