Cryptograph Implementation Part 2 (Two-Way Cryptograph)

Advertisement
two-way cryptograph implementation | internet blog, computer how to, SEO blog | Kartolo Cyber Center
This Two-Way Cryptograph was the continuation of one-way cyptograph implementation, and more simple than the previous one. This type of cryptography may often referred to as cryptographic "real", because it has the "encrypt" to transform plain text into cipher text, and the "decrypt" to restore cipher text into plain text. In this type of cryptography, in addition to plain text and cipher text, it takes another parameter called "key". Currently there are two types of keys are used, the "Symmetric Key" and "Assymetric Key".

The thing to remember in this process is a two-way cryptography, encrypt and decrypt process should have a conflicting operation. For example, the encrypt process we use the operator "+" (plus), then decrypt the process we have to use the operator "-" (minus). Therefore, the implementation of the encrypt and decrypt kriptografinya made ​​into two different implementations, but complementary. To decrypt processes, implementation will emulate a software serial verification process, while the process encrypt, implementation will act as a "keygen" it.
Advertisement
Cryptograph Implementation Part 2 (Two-Way Cryptograph) | KartoloCyber | 5

0 comments:

Post a Comment