ICT Data Security 2 Dissertation Example For Download

5
(2)
Category: High School
Subcategory: Management
Level: High School
Pages: 1
Words: 275
Get document Get an original paper

Cryptographic algorithms refer to complex mathematical equations and secret keys used to make data unreadable through encryption and reverse the process to make the data readable again in a process known as decryption. The three classes of cryptographic algorithms are hashing, symmetric and asymmetric. Hashing is used to transform a massive random-size data into a small fixed data. Symmetric algorithm refers to the creation an equal number of encryption and decryption keys. Symmetric keys are created and distributed to the senders and recipients of a set of data which is unknown to other entities. Asymmetric encryption is also referred to as public-key algorithms. It generates many public keys and one private key (Mehmood, 2017). Information about the private key in only revealed to the owner while anyone can access the public keys; this is mainly used in the creation of digital signatures and generation and distribution of session keys which ensure security between computers exchangin...

Free ICT Data Security 2 Dissertation Example

All examples
Do you need an original dissertation?

Approach our writing company for get top-quality dissertation services and paper written from scratch strictly on time!