ABSTRACT
Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. Cryptography is used to ensure that the contents of a message are confidentiality transmitted and would not be altered. Confidentiality means nobody can understand the received message except the one who has the decipher key, and data cannot be changed means the original information would not be changed or modified; this is done when the sender includes a cryptography operation called a hash function in the original message. A hash function is a mathematical representation of the information, when any information arrives at its receiver; the receiver calculates the value of this hash function. If the receiver’s hash function value is equivalent to the sender’s, the integrity of the message is assured.
Keyword: Symmetric Encryption, Asymmetric Encryption,Hash Algorithm, Caesar Table.
TABLE OF CONTENT
Title Page
Certification i
Dedication ii
Table of Content iii
Abstract iv
Introduction 1
History of Cryptography 3
Cryptography Goals 7
Basic Terminology of Cryptography 8
Advancement in Cryptography 10
Symmetric and Asymmetric Encryption 12
Results and Comparison 19
Conclusion 20
Reference 21
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2016, 01). Cryptography In Information Technology.. ProjectStoc.com. Retrieved 01, 2016, from https://projectstoc.com/read/6904/seminar-report-on-cryptography-in-information-technology-8085
"Cryptography In Information Technology." ProjectStoc.com. 01 2016. 2016. 01 2016 <https://projectstoc.com/read/6904/seminar-report-on-cryptography-in-information-technology-8085>.
"Cryptography In Information Technology.." ProjectStoc.com. ProjectStoc.com, 01 2016. Web. 01 2016. <https://projectstoc.com/read/6904/seminar-report-on-cryptography-in-information-technology-8085>.
"Cryptography In Information Technology.." ProjectStoc.com. 01, 2016. Accessed 01, 2016. https://projectstoc.com/read/6904/seminar-report-on-cryptography-in-information-technology-8085.
- Related Works
- Mobile Information Provider
- Design And Implementation Of A Computer Based Seaport Billing System (a Case Study Of Nigerian Port Authority Lagos)
- Design And Implementation Of A Computersized National Identity Card Processing System (a Case Study Of National Identity Card, Anaoch Local Governemnt Area Anambra State.)
- Financial Account Audit Using Audit Command Language (acl).
- Design A Web Based Portal For Student Registration Exercise (case Study Of Mathematics And Computer Science Departments)
- Design And Implementation Of Computerized Banking Monitor Information System (a Case Study Of Central Bank Plc Enugu)
- Secure Data Hiding And Extraction Using Bpcs
- Design And Implementation Of A Computerized Transaction Receipt Generating System For An Atm Machine (a Case Study A Union Bank Of Nigeria)
- Design And Implementation Of Online Cash Receipt Generation System For A Supermarket. (a Case Study Of Roban Stores Ltd)
- Design And Implementation Of A Computerized Temperature Control System For A Cold Room