the data is not only text, there are several types of data such as : audio , image and other multimedia , images have been vastly used in our life , while the more widely we use image , the more necessary their security will be.
it should to give real data to real person at real time , what actually the data has been sent should be exactly the data been received.
image security has became a prime concern in the current computer world.
the prime things that a security has to achieved are: confidentiality, integrity availability and authentication.
most security system use cryptography cause it allows various algorithm and techniqe particulary its too hard to break because of thier complixity
cryptography ensures that the data must be sent without any modifieds and only the autherized person can be able to open and see the data, and there are alot of cryptography techniques developed to accomplish secure channel.
cryptography is the sceince that studies the mathmatical techniques for the message against attack, there are basic term used in cryptography the following below are explain it :
-Plain Text : The primer message that the person wants to communicate with the other
-Cipher Text : The result of converting primer message to meaningless message
-key: is a numeric or alpha numeric text or may be a special symbol.
-Encryption : A process of converting original-plain Text into Cipher Text this process requires an encryption algorithm and a key.
-Decryption : It is a process of converting Cipher Text into Plain Text , this process requires a Decryption algorithm and a key.and it is reverse process of encryption.
Cryptography is very important since the security of encryption algorithm depends directly on it.
it is classified into two techniques:
Substitution : the letters of plain text are replaced by other character or any number or by symbols. such as , Caesar cipher.
transposition : some sort of permutation is performed on plaintext. such as, columnar method .
...(download the rest of the essay above)
About this essay:
This essay was submitted to us by a student in order to help you with your studies.
If you use part of this page in your own work, you need to provide a citation, as follows:
Essay Sauce, The growth of computer networks. Available from:<https://www.essaysauce.com/information-technology-essays/the-growth-of-computer-networks/> [Accessed 26-08-19].
Review this essay:
Please note that the above text is only a preview of this essay.