Professional Documents
Culture Documents
λζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπ
λζξχϖβ νµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπ
ασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθ
ωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλ
ζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπα
σδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωε
CHAPTER 1
ρτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξ
ρτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζ
INTRODUCTION ξ
χϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδ
For
φγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτ
Dynamic Matrix Emulation Technique
ψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖ
βνµθωερτψυιοπασδφγηϕκλζξχϖβνµρτψυιοπασδφγηϕκ
λζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπ
ασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθ
ασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλ ζξχϖβνµθ
ωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλ
ζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπα
σδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωε
ρτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξ
χϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδ
φγηϕκλζξχϖβνµρτψυιοπασδφγηϕκλζξχϖβνµθωερτψυι
φγηϕκλζξχϖβνµρτψυιοπασδφγηϕκ λζξχϖβνµθωερτψυι
οπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµ
θωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκ
λζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπ
ασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθ
ωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπασδφγηϕκλ
ζξχϖβνµθωερτψυιοπασδφγηϕκλζξχϖβνµθωερτψυιοπα
ζξχϖβνµθωερτψυιοπασδφ γηϕκλζξχϖβνµθωερτψυιοπα
The requirements of information security within an
organization have undergone a major change in last two decades.
Before the widespread use of data processing equipment, the security
of information used to be provided primarily by physical and
administrative means. With the introduction of computers, the need
of automated tools for protecting files and other information stored
in the computer became evident. This is especially the case for a
shared system, such as a time-sharing system, and the need is even
more acute for systems that can be accessed over a public telephone
network, data network, or the Internet. With the remarkable
advancement of technology and availability of facilities, the interest
of people to connect computers to form networks is increasing
rapidly. In this digital system, a huge amount of data flow exists.
Besides this, different distributed processing involves a large amount
of complex digital data transfer.
1. The Military
2. The Diplomatic Corps
3. Diarists
4. Lovers
Of these, the military has had the most important role and
has shaped the field over the centuries. Within military
organizations, the messages have to be encrypted and
traditionally been given to poorly-paid, low-level code clerks
for encryption and transmission. The sheer volume of messages
prevented this work being done by a few elite specialists.
(1) Until the advent of computers, the ability of the code clerk
to perform the necessary transformations.
(3) The danger of a code clerk being captured by the enemy has
made it essential to be able to change the cryptographic method
instantly if needed.
1.2 Cryptographic Algorithms: -
There are many algorithms and amongst them the most important
are: -
1. Secret-key Algorithm
2. Symmetric-key Algorithm
3. Public-key algorithm