The Key Essays

  • Asymmetric Key Encryption Algorithms

    1343 Words  | 6 Pages

    constituents of computer security. Public cryptography is the art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decrypt the message into plain text. This paper reviews five commonly used asymmetric key cryptography algorithms namely RSA, Diffie–Hellman, El Gamal, DSA and ECC and present their comparative study. 1. Introduction Today security is the challenging aspect in internet and network application

  • Steganography: The Art Of Information Technology

    1651 Words  | 7 Pages

    ARCHITECTURE OF NEW HIDING TECHNIQUE FOR PROJECTED & COMPRESSED TEXT IN DIGITAL IMAGE Aditi Soni, Sujit K. Badodia SVITS, Indore, India ABSTRACT The art of information hiding has received lots of attention in the recent years as security of information has become a big concern in this internet epoch. As sharing of sensitive information through a common communication channel has become unavoidable, Steganography is the science and art of hiding information. Steganography means hiding a secret message

  • Factors That Influence Leadership Styles

    1423 Words  | 6 Pages

    Understanding leadership Describe the factors that will influence the choice of leadership styles or behaviours in workplace situations Leaders are performing different styles of leadership, as each leader maintain to develop her/his own personal style. Many factors may influence the style a leader uses. Some of the factors may create naturally, while others are a product of the leader's environment. Some leaders may need to improve their leadership style to follow to a changing culture. a. Personality

  • Positives And Disadvantages Of Tourism

    1385 Words  | 6 Pages

    Since the start of everything humans have travelled. Water, food, shelter and trade were the major reasons why people travelled. However societies wanted more advantage from tourism, so people began using it as pleasure and to explore. Technology has been attached to tourism, as the better the technology more ways there are to get where you want to. From domesticating animals to the extent of travelling on wheels or by boat. Throughout the years improvements have allowed different methods to travel

  • Katniss Hidden Traits

    1230 Words  | 5 Pages

    Hidden Traits Throughout the novel, The Hunger Games by Suzanne Collins, there are is a wide variety of different themes presented, but some are more prominent than others. One of the controlling ideas in the book was: when people are faced with the threat of death and tragedy it causes their strongest to traits to surface, and their true character immerges. Mrs. Collins does a great job of projecting these morals through the protagonist of the story, Katniss Everdeen. Katniss gradually reveals

  • The Employee Selection Process

    864 Words  | 4 Pages

    The survival and success of an organisation is dependent on its people. Employers must be able to recruit and select potential employees that are most suited for the job. Every organization has their own requirements in recruiting employees as it shapes the organization’s effectiveness and performance. Hence, the employee selection process and assessment plays an important role maintaining an organisation. Employee selection is defined as the process in which executives and managers employ the use

  • Essay On Wireless Doorbells

    1094 Words  | 5 Pages

    Let's be honest. Technology advancing rapidly and we need to adjust. The first priority of each person is to have the comfort they need. Try to imagine because the most place most people really feel comfortable It is obviously their homes. And having a wireless door bell of course will make our homes smart ,comfortable, safe and secure. Anyone living in a house instead of an apartment will probably have experienced that frustration associated with the calls that are missing. This is not only frustrating

  • Active Camouflage Research Paper

    2576 Words  | 11 Pages

    JAYARAJ ANNAPACKIAM CSI COLLEGE OF ENGINEERING NAZARETH DEPARTMENT OF ECE - IV PAPER ON OPTICAL CAMOUFLAGE (Application to IMAGE PROCESSING) BY, J.IMMANUEL V.JEFRINS E MAIL-ID : ABSTRACT: The abstract of this paper is the working principle of a Harry Potter-like invisibility cloak. In order to make the cloak invisible, Light from all directions travel through the object, rather than hitting it. Because of not being able to interact with light, the hidden

  • Fuzzy Logic Essay

    2584 Words  | 11 Pages

    CHAPTER 3 TWO LEVEL FUZZY LOGIC BASED INTRUSION DETECTION SYSTEM (TLFL IDS) FOR BLACKHOLE ATTACKS IN WIRELESS AD HOC NETWORKS 3.1 FUZZY LOGIC 3.1.1 INTRODUCTION TO FUZZY LOGIC A fuzzy logic system (FLS) can be defined as the nonlinear mapping of an input data set to a scalar output data .A FLS consists of four main parts namely fuzzifier, rules, inference engine and defuzzifier. The fuzzy logic process has been explained by the following steps. Initially, a crisp set of input data have been converted

  • Essay On Image Processing

    5682 Words  | 23 Pages

    AN IMPROVED EDGE DETECTION METHOD USING HYBRID FUZZY COGNITIVE MAP FOR BIOMETRIC IMAGES CHAPTER 1 INTRODUCTION The growing possibilities of modern communication need the special mean of security on computer network. In the computer world, it is very important to keep secret information secret, private information private and protect the copyrights of data. To accomplish this task, new methods based on the principle of Image processing are being developed and used. Image processing is any form

  • Elliptic Curve Cryptography Lab Report

    2282 Words  | 10 Pages

    cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on plain Galo fields) to provide equivalent security. The major advantage of elliptic curve cryptography is that it offers equal security for a smaller key-size when compared to its

  • The Art Of Steganography

    7033 Words  | 29 Pages

    Public key cryptography is an asymmetric method that use a pair of keys for encryption: a public key which is used to encrypt data, and private, or secret key is used to decryption. It requires that a person must have a pair of public key and private key. The public key is distributed in the open so that anyone wishing to communicate with that in a secure way than he can use the receiver’s public key to convert the plaintext into cipher text. This cipher

  • Homomorphic Encryption Case Study

    1076 Words  | 5 Pages

    version of Smart’s approach [4] and hope to still report initial results and improvements in the near future. Smart currently tries to find the right parameters of his approach, to find out what really works best. For example, the generation of the key is very slow, which can be optimized, it is a bit like tuning a race car, you work on the engine and then suddenly discovered that the wheels are the

  • Two Factor Authentication Analysis

    762 Words  | 4 Pages

    of logging in to an account involves entering a username and password. This is referred to as single-factor authentication. Two Factor Authentication (2FA) is a verification process that adds another level of authentication by mandating the user to key at least two out of the three different types of credentials before allowing access to an account. Usually these two factors address “what the users have” and “what the users know”. Broadly they can be outlined as follows: • Something known to the user

  • Pin-Tumbler Lock Design Process

    1077 Words  | 5 Pages

    developed in the 20th century, including timer locks used in bank vaults, push button locks, and electronic locks that operate with a credit card like key. The manufacturing process that follows is for a standard pin-tumbler lock. This is the kind of lock that may be found on any front door or file cabinet drawer. Raw Materials Standard five-tumbler key locks are made of various strong metals. The internal mechanisms of locks are generally made of brass or die-cast zinc. The cam is made of steel or

  • Essay On Encryption

    978 Words  | 4 Pages

    CASE STUDY NEED FOR ENCRYPTION OF DATA WITH REFERENCE TO NASA DATA BREACH Introduction 1. The concept of encryption has been in practice since ages, but changing its significance and mathematical complexities backing it. The need for encryption has so existed ever since man wanted secrecy. The present day world has abundant digital data playing an important role in their everyday life. The sheer need of this magnitude of data brings in the requirement of secrecy and authenticity. Digital encryption

  • The Characteristics Of Franz Schubert's 'Erlkönig'

    755 Words  | 4 Pages

    Franz Schubert, in my opinion, is considered as one of the last Classical Era composers and one of the pioneers of the Romantic Era composers. Schubert’s is an artist who devotes himself entirely to the arts, rather than chasing money and worldly gains. He has set a movement where many other composers would follow. In his 31 years of life he had written many works. He had more that 600 works on Lieder, 7 masses, 9 symphonies, including the Unfinished (No. 8,1822) and more. His famous piece, “Erlkönig”

  • Cryptography Essay

    1042 Words  | 5 Pages

    called as public key encryption as the user publicly distributes one of the keys without a care of secrecy. In the case of confidential message to the user, they distribute the encryption key. Asymmetric encryption relies on the fact that possession of the encryption key will not reveal the decryption key. Moreover, digital signature is form of authentication with some parallels to public key encryption. The two keys are the public verification key and secret signature key. As in public key encryption

  • The Importance Of Steganography

    970 Words  | 4 Pages

    technique of hiding the message in a chosen carrier such that no one except the intended recipient is aware of its existence. Secrecy: Extraction of hidden data from the host medium should not be possible without the knowledge of the proper secret key used in the extracting procedure. Imperceptibility: After embedding the data in the medium, it should be imperceptible from the original medium. High capacity: The maximum length of the hidden message that can be embedded can be as long as possible

  • Analysis Of Anne Goodwin's Four Hail Marys

    1426 Words  | 6 Pages

    “Four Hail Marys” is a short story by Anne Goodwin, in the beginning of the story the reader meets Mary the protagonist, as that major have an importance to her. The title of the story “Four Hail Marys” alerts the reader know that the setting of the story takes place in a Roman Catholic Church. The reader also meets Graham the antagonist, as he is the person who causes Mary to change her direction, thus contributing to the development of the story. He unintentionally made Mary to go church running