Digital Signatures

Introduction: – In the previous tutorial, you have learned about the different ways of message authentication schemes and techniques. In this tutorial you will learn more about the authentication of digital messages and documents.   What is Digital Signature: – Digital signature is a mathematical model implemented for validating the integrity and authenticity of any information, message, e-documents or software. You can say it as digitally equivalent of handwritten signature or the stamp-seal being made in papers and hard copies. But

Read more

Authentication of Message

Introduction: – In the earlier chapters, you have learned about the various types and sub types of encryption technique along with their names. There are more in cryptography and cryptographic techniques that deals with the integrity of data and their threats. There is another type of data threat which is lack in authentication of message. In this case of threat the user is not sure whether the message he/she received is from the originator (one who has origin or created

Read more

Asymmetric Key Encryption

Introduction: – In the earlier tutorial you have learned about the symmetric key encryption and also saw some of the examples and algorithms associated with it. In this tutorial, you will see another type of encryption technique – the asymmetric key cryptography. These techniques are also dependent on the number of keys used and in which form. Asymmetric Key Cryptography: – Asymmetric Key Encryption: These are special encryption technique which is having 2 keys, the public and the private key.

Read more

PKI and Digital Certificates

Introduction: – In this tutorial you will learn about some distinct properties and uses of some security services. Yes, I’m talking about the PKI and Digital Certificates. So, let us dig deep into it.   PKI (Public Key Infrastructure): – PKI is a service that allows internet users and other public networks in having a secured communication, data or monetary exchange, or even files exchanging. This is done through a key pair combination, public and private keys sanctioned by any

Read more

Hash Function in Cryptography

Introduction: – In your previous tutorials there were some security measure topics which come up with the term called hash functions. So, let’s learn and understand what hash function is and how it helps in security through this tutorial. What is Hash Function? Hash Function is one of the most widely used cryptographic technique and is implemented in various applications. These hash functions are basically a mathematical algorithms which are used for converting any numerical inputs to a different numerical

Read more