- Cryptanalysis and Types of Attacks on Ciphertexts - 27 February 2013
- Chances of Breaking Cryptograms in Different Scenarios - 24 February 2013
- Main Differences between Symmetric and Public Key Cryptography - 9 January 2013
- Differences between Cryptography, Steganography and Digital Watermarking - 20 May 2013
- Difference between Confusion and Diffusion in Cryptography - 18 October 2016
Cryptography
Subscribe to:
Posts (Atom)
Popular Posts
-
Symmetric key cryptography systems use the same key for both to encrypt the plaintext and to decrypt the ciphertext. Symmetric key systems...
-
Cryptography is defined as the art and science of secret writing. The word itself comes from Greek where the words kruptos (κρυπτοσ) and ...
-
Policy is basically a written document that lays out the exact requirements or rules that must be met by the employees. It generally...
-
What are Blind, Semi-blind and Non-blind Watermarking Systems? Digital watermarking systems can be grouped in three schemes - they are Bli...
-
Checking Image Quality Using MATLAB PSNR program PSNR or peak-to-noise ratio is used to evaluate the quality of the watermarked image aft...
-
TVA: Threat-Vulnerability-Asset TVA worksheet lists the asset in priority order along one axis and the threats it is exposed to by prio...
-
The Security System Development Life Cycle (SecSDLC) is a variant of SDLC which can be used in developing an Information Security Policy. ...
-
Find below the Matlab codes to embed a watermark image into a cover(host) image: clear all; close all; clc; [filename1,pathname]=uigetfi...
-
The Interesting Story of Lena.jpg The image above is one that has been widely used in the image compression studies, even today. ...
-
A ciphertext has the possibility of being broken by using statistical analysis that could provide some information on the frequency of char...