Back to Search

Encryption

AUTHOR Amini, Keyvan
PUBLISHER Lulu.com (04/21/2014)
PRODUCT TYPE Hardcover (Hardcover)

Description
encryption is the process of encoding messages or information in such a way that only authorized parties can read it.Encryption doesn't prevent hacking but it reduces the likelihood that the hacker will be able to read the data that is encrypted.In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.
Show More
Product Format
Product Details
ISBN-13: 9781312124851
ISBN-10: 1312124857
Binding: Hardback or Cased Book (Sewn)
Content Language: Persian
More Product Details
Page Count: 88
Carton Quantity: 36
Product Dimensions: 6.00 x 0.25 x 9.00 inches
Weight: 0.64 pound(s)
Feature Codes: Illustrated
Country of Origin: US
Subject Information
BISAC Categories
Computers | General
Descriptions, Reviews, Etc.
publisher marketing
encryption is the process of encoding messages or information in such a way that only authorized parties can read it.Encryption doesn't prevent hacking but it reduces the likelihood that the hacker will be able to read the data that is encrypted.In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.
Show More
List Price $24.72
Your Price  $23.48
Hardcover