Advertisements
Advertisements
प्रश्न
Explain encryption technology.
दीर्घउत्तर
उत्तर
- Encryption technology is an effective information security protection.
- It is defined as converting a Plaintext into meaningless Ciphertext using an encryption algorithm thus ensuring the confidentiality of the data.
- The encryption or decryption process uses a key to encrypt or decrypt the data.
Types:
At present, two encryption technologies are widely used. They are:
- Symmetric key encryption system
- Asymmetric key encryption system.
- Symmetric key encryption – Data Encryption Standard (DES):
- It is a Symmetric-key data encryption method.
- It is the typical block algorithm that takes a string of bits of clear text (plaintext) with a fixed length into another encrypted text of the same length.
- It also uses a key to customize the transformation, so that, in theory, the algorithm can only be deciphered by people who know the exact key that has been used for encryption.
- The DES key is apparently 64 bits, but in fact, the algorithm uses only 56. The other eight bits are only used to verify the parity and then it is discarded.
- The key length increased by multiple uses of the DES, described as Triple-DES, also known as TDES, 3DES or DESede.
- Asymmetric or Public key encryption
- It is also called as RSA (Rivest-Shamir-Adleman) algorithm.
- It uses public-key authentication and digital signatures.
- Each user generates their own key pair, which consists of a private key and a public key.
- A public-key encryption method is a method for converting a plaintext with a public key into a ciphertext from which the plaintext can be retrieved with a private key.
shaalaa.com
Security Technologies in E-commerce Transaction
क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
APPEARS IN
संबंधित प्रश्न
PGP stands for ______.
Secure Electronic Transaction (SET) was developed in ______.
The websites secured by Secure Socket Layer protocols can be identified using ______.
3-D Secure, a protocol was developed by ______.
Write about digital signature.
Differentiate asymmetric and symmetric algorithms.
Explain 3D secure payment protocols.
Differenticate digital signatures and digital certificates.
Define Secure Electronic Transaction (SET).
Explain the features of Secure Electronic Transaction (SET).