Академический Документы
Профессиональный Документы
Культура Документы
-A guide to Salvation
What is cryptography?
Hiding information encryption and Decryption Uses mathematical, computer science, and engineering concepts Applications - ATM cards, computer passwords, and electronic commerce
ELIPTIC CURVES
y2 = x3 + ax + b The set of points on an elliptic curve forms a group under a certain addition rule the Elliptic Curve Discrete Logarithm Problem (ECDLP) Difficult to crack mathematical concept combine number theory and algebraic geometry An elliptic curve consists of the set of real numbers (x, y) that satisfies the above equation
QUANTUM CRYPTOGRAPHY
Quantum key distribution Fundamental aspect of quantum mechanics Uses the concepts of Quantum Superpositions Quantum entanglement and transmitting information Relies on the computational difficulty of certain mathematical functions Only Used to produce and distribute a key, not to transmit any message data
HASH FUNCTION
converts a large, possibly variable-sized amount of data into a small datum used to speed up table lookup or data comparison tasks finding items in a database, detecting duplicated or similar records in a large file, finding similar stretches in DNA sequences Although the idea was conceived in the 1950s, the design of good hash functions is still a topic of active research.
CONCLUSION:
Because of the need for Authentication Privacy/confidentiality Integrity Non-repudiation Cryptography plays a vital role by providing all the above benifits and comforts thus i hereby conclude this paper with my suggestion for the lateral improvement.
Upshot of my research:
destroy the source (with out leaving any traces of the technique used) as soon as the encrypted data is created,by this way easy cracking of the cipher by the piracy lovers can be escaped. Have to continuously change the encryption and decryption techniques by implementing the advanced technology
T#@^1< \!0u