Nt1310 Unit 3 Assignment 1

1612 Words4 Pages

1. Briefly describe a checksum first. Then describe how the cryptographic checksum algorithm, a secret key cryptography, can do integrity check and why it works.
Checksum: Checksum is an error detection method. Checksum is mainly used to conform the integrity of the data portions being transmitting. While transmitting data some bits may missed or duplicate bits may be added to the original data this may result in the error in received as it is not identical as the transmitted data. To avoid such errors and also to detect errors checksum is used. While transmitting the data the transmitter will calculates the checksum for the data that being transmitted using the algorithm, algorithm is namely called as Hash algorithm. Finally data will transmitted …show more content…

Digital signatures allow users to sign keys to verify their identifies. A contribution has levels of security to the subject with ideas and other hacker scenarios. Public key encryption with digital signatures offers both security and data integrity against most attackers. In public key cryptography it has message authentication involves hashing the message to produce a digest with a private key to produce a digital signatures. Therefore verification is done …show more content…

Public key cryptography is a secure for an electronic communication over an open network such as internet which relays on converting channel even after key exchange. It deals with the security problems such as man in the middle attacks and other security threats. Public key cryptography is a technique which is used in asymmetric key algorithms which is used by one party whether to perform encryption or decryption but not the same key and another key is used for counterpart

More about Nt1310 Unit 3 Assignment 1

Open Document