Skip to main content

Posts

Showing posts from 2021

Cryptography concerns / History of cryptography

  Public-key or asymmetric-key encryption  algorithms   use a pair of keys, a public key associated with the creator/sender for encrypting messages and a private key that only the originator knows (unless it is exposed or they decide to share it) for decrypting that information. Examples of public-key cryptography include: RSA , used widely on the internet Elliptic Curve Digital Signature Algorithm (ECDSA) used by Bitcoin Digital Signature Algorithm (DSA) adopted as a Federal Information Processing Standard for digital signatures by NIST in FIPS 186-4 Diffie-Hellman key exchange To maintain data integrity in cryptography,  hash functions , which return a deterministic output from an input value, are used to map data to a fixed data size. Types of cryptographic hash functions include SHA-1 (Secure Hash Algorithm 1), SHA-2 and SHA-3. Cryptography concerns Attackers can bypass cryptography, hack into computers that are responsible for data encryption and decryption, and...

Cryptographic algorithms / Types of cryptography

  Cryptographic algorithms Cryptosystems use a set of procedures known as cryptographic algorithms, or  ciphers , to encrypt and decrypt messages to secure communications among computer systems, devices and applications. A cipher suite uses one algorithm for encryption, another algorithm for message authentication and another for key exchange. This process, embedded in protocols and written in software that runs on operating systems (OSes) and networked computer systems, involves: public and private key generation for data encryption/decryption digital signing and verification for  message authentication key exchange Types of cryptography Single-key or symmetric-key encryption  algorithms  create a fixed length of bits known as a  block cipher  with a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decipher it. One example of symmetric-key cryptography is the Advanced Encryption Standard ( AES ). AES is a ...

Modern cryptography concerns itself with the following four objectives:

  Modern cryptography concerns itself with the following four objectives: Confidentiality.  The information cannot be understood by anyone for whom it was unintended. Integrity. The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. Non-repudiation.  The creator/sender of the information cannot deny at a later stage their intentions in the creation or transmission of the information. Authentication.  The sender and receiver can confirm each other's identity and the origin/destination of the information.

Cryptography techniques

  Cryptography techniques Cryptography is closely related to the disciplines of  cryptology  and  cryptanalysis . It includes techniques such as microdots, merging words with images and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling  plaintext  (ordinary text, sometimes referred to as  cleartext ) into  ciphertext  (a process called  encryption ), then back again (known as decryption). Individuals who practice this field are known as cryptographers.

What is cryptography?

What is cryptography?   Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email.

python variable

                                         Python Variable VARIBALE - Variable like a container , which mean in this variable on  store the data/value. example- A = 10 where  A is a variable  = is asignment operator 10 is value  note: 1-always variable declear   char ,$,string variable not declear in digit form as- avariable     $name    $_name

Comment in python_05

                                Comment in python  Single line comment single line comment are use to comment on one line as     #comment multiline comment multiline comment sre use to multiline comment, as '''comment'''

First Program In PYTHON & SINGLE/DOUBLE/TRIPAL QUETS_04

                                 First Program  In PYTHON                                    Print("hello world")                                     Print("your name")                                   Print("mobile number")                    Print("Welcome in python programming") use of all keyword what is the use of print A print of use to display the output , as print("?") What s the use of Single Quets, when we are taking a charecter then we use single quets as print('?') What s the use of Double Quets, when we are taking a string then we use double quets, as print("?") What s the us...

Setting up PATH at Linux/unix/windows_3

  Setting up PATH Programs and other executable files can be in many directories, so operating systems provide a search path that lists the directories that the OS searches for executables. The path is stored in an environment variable, which is a named string maintained by the operating system. This variable contains information available to the command shell and other programs. The  path  variable is named as PATH in Unix or Path in Windows (Unix is case sensitive; Windows is not). In Mac OS, the installer handles the path details. To invoke the Python interpreter from any particular directory, you must add the Python directory to your path. Setting path at Unix/Linux To add the Python directory to the path for a particular session in Unix − Setting path at Windows To add the Python directory to the path for a particular session in Windows − At the command prompt  − type path %path%;C:\Python and press Enter. Note  − C:\Python is the path of the Python directo...

Installing Python Windows/unix/linux_02

Installing Python Python distribution is available for a wide variety of platforms. You need to download only the binary code applicable for your platform and install Python. If the binary code for your platform is not available, you need a C compiler to compile the source code manually. Compiling the source code offers more flexibility in terms of choice of features that you require in your installation. Here is a quick overview of installing Python on various platforms − Unix and Linux Installation Here are the simple steps to install Python on Unix/Linux machine. 1-Open a Web browser and go to  https://www.python.org/downloads/ . 2-Follow the link to download zipped source code available for Unix/Linux. 3-Download and extract files. 4-Editing the  Modules/Setup  file if you want to customize some options. 5-run ./configure script 6-make 7-make install Windows Installation Here are the steps to install Python on Windows machine

Python Intoduction & Local Environment Setup_1

                                                            WHAT IS PYTHON                     Python is an interpreted, object-oriented, high-level programming language,                                    WHY USE PYTHON      Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is  a general purpose language , meaning it can be used to create a variety of different programs and isn't specialized for any specific problems Local Environment Setup Open a terminal window and type "python" to find out if it is already installed and which version is installed. Unix (Solaris, Linux, FreeBSD, AIX, HP/UX, SunOS...

Data Analytics 13000+ MCQs Question

                       Data Analytics MCQ 15000+ Data Analytics       Unit 1:     1. Data Analysis is a process of?    A. inspecting data B. cleaning data C. transforming data D. All of the above      2. Which of the following is not a major data analysis approaches?    A. Data Mining B. Predictive Intelligence C. Business Intelligence D. Text Analytics      3. How many main statistical methodologies are used in data analysis?    A. 2 B. 3 C. 4 D. 5      4. In descriptive statistics, data from the entire population or a sample is summarized with ?    A. integer descriptors B. floating descriptors C. numerical descriptors D. decimal descriptors View Answer      5. Data Analysis is defined by the statistician?    A. William S. B. Hans Peter Luhn C. Gregory Piatetsky-Shapiro D. John Tukey...