Which is the process of converting data to an unrecognizable or encrypted form?

Suggest a new Definition

Proposed definitions will be considered for inclusion in the Economictimes.com


Definition: The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.

Description: One of the reasons for implementing an encryption-decryption system is privacy. As information travels over the Internet, it is necessary to scrutinise the access from unauthorized organisations or individuals. Due to this, the data is encrypted to reduce data loss and theft. Few common items that are encrypted include text files, images, e-mail messages, user data and directories. The recipient of decryption receives a prompt or window in which a password can be entered to access the encrypted data. For decryption, the system extracts and converts the garbled data and transforms it into words and images that are easily understandable not only by a reader but also by a system. Decryption can be done manually or automatically. It may also be performed with a set of keys or passwords.

There are many methods of conventional cryptography, one of the most important and popular method is Hill cipher Encryption and Decryption, which generates the random Matrix and is essentially the power of security. Decryption requires inverse of the matrix in Hill cipher. Hence while decryption one problem arises that the Inverse of the matrix does not always exist. If the matrix is not invertible then the encrypted content cannot be decrypted. This drawback is completely eliminated in the modified Hill cipher algorithm. Also this method requires the cracker to find the inverse of many square matrices which is not computationally easy. So the modified Hill-Cipher method is both easy to implement and difficult to crack.

  • PREV DEFINITION

  • NEXT DEFINITION

Related News

Scheduled maintenance: Thursday, December 8 from 5PM to 6PM PST

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only SGD 41.99/year

  1. Social Science
  2. Sociology

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Symmetric Encryption

Terms in this set [18]

Encryption

1. Process of converting readable data into unreadable characters to prevent unauthorized access.
2. Encryption is the act of taking a message, called plaintext, and applying an operation to it, called a cipher.
3. The reverse process, taking the garbled output and
transforming it back into the readable plain text is called decryption.

Encryption Algorithm

1. a complex mathematical transformation that encrypts or decrypts binary data.
2. The encryption algorithm is the underlying logic or
process that's used to convert the plaintext into ciphertext.

Cipher

1. the generic term for a technique [or algorithm] that performs encryption.
2. A cipher is actually made up of two components,
the encryption algorithm and the key.
3. first you pick an encryption algorithm
you'd like to use to encode your message, then choose a key. Now you have a cipher, which you can run your plaintext message through and get an encrypted ciphertext out ready to be sent out into the world, safe and secure from prying eyes.

Steganography

1. the art and science of hiding information by embedding messages within other, seemingly harmless messages.
2. the practice of hiding information from observers, but not encoding it.

Risk Assessement

Vulnerability Assessment + Threat Assessment.

Threat

Adversarial - Hacker, Malware
Accidental - User accidentally deleted the data
Structure - Power supply, Camera failure
Environmental - Fire, Earthquake

Risk Response

1] Mitigation - eg apply new security feature
2] Risk Transference - eg Cloud server
3] Risk Acceptance - Cost > Mitigation
4] Risk Avoidance - Likelihood of risk and Impact are so high. I don't want to do anything about it.

Administrative Control

LGBP:
Laws, Guidelines, Best practices, and Policies

Technical Control

Computer stuff, Firewalls, Password links. Authentication, and Encryption

Physical Control

Gates, Guards, Keys, and Man traps

Security Control Functions

CCDDP:
Corrective, Compensating, Deterrent, Detective, and Preventative

Sources of IT Governance

come from Laws & Regulations, industry best practices, and internal standards

Pharming

Pharming is is a type of phishing that hackers use to steal personal and sensitive information from victims on the internet. Malicious code is injected into the user's computer system. This is known as DNS cache poisoning. The DNS system, which used to resolve domain names into IP addresses, is corrupted.
A web page created to deceive visitors into believing that is another company's web page.

Whaling

A whaling attack is a method used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.

Eavesdropping

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent. The practice is widely regarded as unethical, and in many jurisdictions is illegal.

Man-in-the-middle attacks - MITM Attacks [Close to you or with malware]

Man-in-the-middle attacks come in two forms, one that involves physical proximity to the intended target, and another that involves malicious software, or malware. This second form, like our fake bank example above, is also called a man-in-the-browser attack.

Man-in-the-browser attack [MITB]

With a man-in-the-browser attack [MITB], an attacker needs a way to inject malicious software, or malware, into the victim's computer or mobile device. One of the ways this can be achieved is by phishing.

Bluesnarfing

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs.

Verified questions

question

A study performed by a Columbia University professor [described in Report on Business, August 1991] counted the number of times per minute professors from three different departments said “uh” or “ah” during lectures to fill gaps between words. The data derived from observing 100 minutes from each of the three departments were recorded. If we assume that the more frequent use of “uh” and “ah” results in more boring lectures, can we conclude that some departments’ professors are more boring than others?

Verified answer

finance

In the period in which an intercompany sale occurs, how do the consolidation entries differ when unrealized profits pertain to an intangible asset rather than a tangible asset?

Verified answer

management

Go to www.drumcafe.com, the website for Drum Cafe, a company that specializes in corporate team building through the use of drum circles. Review the website and answer the following questions: Do you think that drum circles are good for team training? Why or why not?

Verified answer

economics

How would a major expansion of the economies in Europe affect the U.S. economy?

Verified answer

Recommended textbook solutions

Anderson's Business Law and the Legal Environment, Comprehensive Volume

23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene

369 solutions

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

Project Management: The Managerial Process

7th EditionClifford Gray, Erik Larson

260 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

Fungi and lots of other awful subjects

40 terms

Emily_Raymond1

chapter 8

68 terms

Jennifer_RichwinePlus

ECON 2133 quiz 5 on CH 10

13 terms

AdenSpivey

Large Intestine Physio

37 terms

kaylee_marcella

What is the process of converting data to an unrecognizable form?

Encryption is a method by which information is converted into secret code [unrecognizable form] that hides the information's true meaning. Encryption is generally used to protect sensitive data so that only the authorized parties can view it and the data cannot be misused .

What is the process of converting encrypted data into a readable form?

Definition: The conversion of encrypted data into its original form is called Decryption.

Is the process of converting electric data to an unrecognizable or encrypted form one that Cannot be easily understood by unauthorized parties?

Explanation: Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

What is the process of data encryption?

Data encryption converts data from a readable, plaintext format into an unreadable, encoded format: ciphertext. Users and processes can only read and process encrypted data after it is decrypted. The decryption key is secret, so it must be protected against unauthorized access.

Bài Viết Liên Quan

Chủ Đề