Advertisements
Advertisements
Question
Explain encryption technology.
Long Answer
Solution
- Encryption technology is an effective information security protection.
- It is defined as converting a Plaintext into meaningless Ciphertext using an encryption algorithm thus ensuring the confidentiality of the data.
- The encryption or decryption process uses a key to encrypt or decrypt the data.
Types:
At present, two encryption technologies are widely used. They are:
- Symmetric key encryption system
- Asymmetric key encryption system.
- Symmetric key encryption – Data Encryption Standard (DES):
- It is a Symmetric-key data encryption method.
- It is the typical block algorithm that takes a string of bits of clear text (plaintext) with a fixed length into another encrypted text of the same length.
- It also uses a key to customize the transformation, so that, in theory, the algorithm can only be deciphered by people who know the exact key that has been used for encryption.
- The DES key is apparently 64 bits, but in fact, the algorithm uses only 56. The other eight bits are only used to verify the parity and then it is discarded.
- The key length increased by multiple uses of the DES, described as Triple-DES, also known as TDES, 3DES or DESede.
- Asymmetric or Public key encryption
- It is also called as RSA (Rivest-Shamir-Adleman) algorithm.
- It uses public-key authentication and digital signatures.
- Each user generates their own key pair, which consists of a private key and a public key.
- A public-key encryption method is a method for converting a plaintext with a public key into a ciphertext from which the plaintext can be retrieved with a private key.
shaalaa.com
Security Technologies in E-commerce Transaction
Is there an error in this question or solution?
APPEARS IN
RELATED QUESTIONS
Asymmetric encryption is also called as ______.
The security authentication technology does not include ______.
- Digital Signatures
- Digital Time Stamps
- Digital Technology
- Digital Certificates
PGP stands for ______.
_____ protocol is used for securing credit cards transactions via the internet.
The websites secured by Secure Socket Layer protocols can be identified using ______.
Write about digital signature.
Write a note on certification authorities (CA).
Differentiate asymmetric and symmetric algorithms.
Write a note on PGP.
Differenticate digital signatures and digital certificates.