PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

DNA Cryptography Using Helix Scuttle Structures for Cloud Systems

Ansgar Mary N

$70.95   $60.68

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Mohammed Abdul Sattar
05 January 2024
In this internet world, keeping information and data safe and secure on computers and other storage devices is a major challenge. Cryptography is a powerful tool for safeguarding sensitive data while it's stored on a hard drive being sent over an insecure network connection. Cryptography is used in various applications of technologically advanced societies, such as the security of ATM cards, electronic commerce and computer passwords. The goals of cryptography are data integrity, confidentiality, authentication and non-repudiation. Cryptography involves both encryption and decryption, maintaining the confidentiality of the keys. Another factor to consider is the strength of the key, which determines how difficult it is to break and retrieve the key. Deoxyribonucleic Acid (DNA) cryptography is a new and innovative branch of information security that can be used in integration with traditional cryptographic approaches to improve security.

Cryptography is the science of hiding the meaning of a message by putting it in a secret or code language. It is a technique for preventing unwanted people from accessing data. The encryption technique and key are the two most important components of cryptography. It is used in data communication for sending and receiving messages in a secret form while travelling through the network.

Cryptography is the area that uses arithmetic and logical operations to create powerful encryption methods to secure data and communication over the internet. In today's online business and e-commerce world, confidentiality, availability and integrity of stored and transferred data are crucial. Cryptography is used to protect the data from the third party as well as for user authentication. It is the art of utilising an encryption key to encode secret information in an illegible, concealed format. Decryption with the same secret key retrieves the data in its original form at the receiver end. The encrypted data and the ability to decrypt it are only available to the person who has the secret key. The most important components of any cryptography process are plain data, secret key, encryption algorithm, cipher data and decryption algorithm.

By:  
Imprint:   Mohammed Abdul Sattar
Dimensions:   Height: 279mm,  Width: 216mm,  Spine: 8mm
Weight:   367g
ISBN:   9798224600021
Pages:   152
Publication Date:  
Audience:   General/trade ,  ELT Advanced
Format:   Paperback
Publisher's Status:   Active

See Also