Skip to main content

ENCRYPTION

SYMMETRIC ENCRYTION
Symmetric encryption is the oldest and best technique that contains a secret key(a number, a word, or just a string)of random letters. This key is applied to the text of a message to change the content. Secret key is used to encrypt and decrypt the message by the sender and receiver.
·       Same digital key is used by sender and receiver to encrypt and decrypt message
·       Different set of keys are required for each transaction
·       Length of binary key is used to encrypt data
·       Advanced Encryption Standard (AES) – Most widely used symmetric key encryption. It uses 128,192, and 256-bit encryption keys
·       Other standards use keys with up to 2,048 bits
·       It provides confidentiality of the message.
·       These algorithms tend to be comparatively fast, but they can be used only when involved parties have already exchanged keys.
·       DES, 3DES and AES are examples of symmetric algorithms.
·       The 56-bit keys used in DES are short enough to be easily brute-forced by modern hardware and DES should no longer be used.
·       Triple DES (or 3DES) uses the same algorithm, applied three times with different keys giving it an effective key length of 128 bits.
·        Due to the problems using the DES algorithm, the United States National Institute of Standards and Technology (NIST) hosted a selection process for a new algorithm. The winning algorithm was Rijndael and the associated cryptosystem is now known as the Advanced Encryption Standard or AES.

ASYMMETRIC ENCRYTION
Asymmetric algorithms use two keys, one to encrypt the data, and either key to decrypt. These inter-dependent keys are generated together. One is labeled the Public key and is distributed freely. The other is labeled the Private Key and must be kept hidden.
Often referred to as Public/Private Key Cryptography, these cryptosystems can provide a number of different functions depending on how they are used.
·       The most common usage of asymmetric cryptography is to send messages with a guarantee of confidentiality. If User A wanted to send a message to User B, User A would get access to User B’s publicly-available Public Key. The message is then encrypted with this key and sent to User B. Because of the cryptosystem’s property that messages encoded with the Public Key of User B can only be decrypted with User B’s Private Key, only User B can read the message.
·       Another usage scenario is one where User A wants to send User B a message and wants User B to have a guarantee that the message was sent by User A. User A would encrypt the message with their Private Key. The message can then only be decrypted using User A’s Public Key. This guarantees that User A created the message Because they are then only entity who had access to the Private Key required to create a message that can be decrypted by User A’s Public Key. This is essentially a digital signature guaranteeing that the message was created by User A.
·       A Certificate Authority (CA) may also digitally sign public keys or certificates. We can authenticate remote systems or users via a mutual trust of an issuing CA.
·       PGP and SSL are prime examples of a systems implementing asymmetric cryptography, using RSA or other algorithms.
·       Asymmetric encryption is used to distribute the session key in secret manner.
·       This technique is used to solve the scalability problem related with symmetric encryption.


Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p