Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Cryptograph Implementation Part 2 (Two-Way Cryptograph)

This Two-Way Cryptograph was the continuation of one-way cyptograph implementation, and more simple than the previous one. This type of cryptography may often referred to as cryptographic "real", because it has the "encrypt" to transform plain text into cipher text, and the "decrypt" to restore cipher text into plain text. In this type of cryptography, in addition to plain text and cipher text, it takes another parameter called "key". Currently there are two types of keys are used, the "Symmetric Key" and "Assymetric Key".

The thing to remember in this process is a two-way cryptography, encrypt and decrypt process should have a conflicting operation. For example, the encrypt process we use the operator "+" (plus), then decrypt the process we have to use the operator "-" (minus). Therefore, the implementation of the encrypt and decrypt kriptografinya made ​​into two different implementations, but complementary. To decrypt processes, implementation will emulate a software serial verification process, while the process encrypt, implementation will act as a "keygen" it.


This post first appeared on Computer World And Tech News, please read the originial post: here

Share the post

Cryptograph Implementation Part 2 (Two-Way Cryptograph)

×

Subscribe to Computer World And Tech News

Get updates delivered right to your inbox!

Thank you for your subscription

×