Essay On Cryptographic Techniques

9959 Words40 Pages

4 Literature Review 4.1 Utilized cryptographic techniques 4.1.1 Introduction Cryptographic techniques are mathematical techniques which are used in various applications worldwide.The mathematical techniques have been implemented on computer technologies which have been utilized in various domains.The brief overview has been appended to the report in order to obtain clear idea about the research. 4.1.2 Hashing Hashes play a major role in information security where they are used to make sure that transmitted messages have not been altered. First the hash of the message which needs to be send is generated ,encrypted by the sender, and sends the encrypted hash along with the message. The recipient of the message decrypts both the message and the hash. After that receiver generates another hash from the received message and compares the two hashes. If they are same, there is a very high probability that the message was transmitted unharmed and integrity of the message is ensured. A cryptographic hash function should be capable of defect against any type of crypto analysis attacks[3]. At least it must encompass the following properties: Pre-image resistance From the given hash h it should be confusing how to find message m such that h = hash(m). Second pre-image resistance If an input m1 is given it …show more content…

When each countries are globally being adopted to PKI ,it is very much convenient to identify people globally by their electronic identification cards. Basically regardless of the PKI software has been utilized the National Root Certificates has to be cross signed to mutually accept the trust of each end entities such as citizens globally. In the research the national certification authorities has to be simulated and there are several leading open source PKI softwares are

Open Document