Hellman algorithm is the earliest and the most simplest key agreement algorithm

Hellman algorithm is the earliest and the most

This preview shows page 4 - 5 out of 5 pages.

Hellman algorithm is the earliest and the most simplest key-agreement algorithm. It also belongs to the class asymmetric encryption algorithms. CYPTOGRAPHY APPLICATION Cryptography has found its application in more than what one can imagine. Major sectors which use cryptographic techniques include defense, government and law enforcement agencies, banking, insurance, business and industry. It has even found its way into sectors like healthcare, education, tourism and social welfare. Cryptography could be applied to text, image, audio and video based scenarios including both real time and non-real time systems
Image of page 4
During the last years, the use of embedded cryptographic processors has spread from low-cost crypto-processors, such as smart cards used for holding decryption keys, to more modern applications, such as user authentication, identity management, e-mail,mobile communication, electronic payment schemes, digital right management and trusted computing Initiative (TCI) In a special mention here, hash functions are used to create one-way password files predominantly stored by an operating system. An operating system could store a hash of password instead of the actual password, thus safeguarding password from a hacker. These can also be used for virus and intrusion detection. A cryptographic hash function can be employed to build a pseudorandom function (PRF) or a pseudorandom number generator (PRNG). A hash-based PRF or PRNG can be potentially be used to generate symmetric keys as well. CONCLUSION Security plays a very important role in preserving the integrity of data. And the ever persisting desire to develop a secure system has brought cryptography in the lime light. In this paper a survey on security challenges and cryptographic encryption schemes has been done from different perspectives. The applicability of cryptography in data security has been studied and summarized.
Image of page 5

You've reached the end of your free preview.

Want to read all 5 pages?

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors