Data Comm Presentation - IV
Data Comm Presentation - IV
Topic - Cryptography
Purpose of doing it ?
Ways of doing it ?
Asymmetric type
-Highly assured security over internet
-More complicated and Slower
-Requires Two keys (Public key and Private key)
- Any internet user gets a private and public key for himself where public key can
be broadcasted or can be thrown openly in network keeping the private key very
safely which is utilized for decrypting the data that came encrypted using the his
own public key.
- Both Public and Private keys of a user are mathematically related , but private key
can not be calculated having public key.
- Apart from these Data Integrity or Data Tampering is checked by using Hash Code
which is a digital fingerprint of any data. --- Version MD5 use 52 bit key
Thank you