Encryption

Home/Tag:Encryption

Basics of Network Security

2020-08-14T07:15:24+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

It is essential for all organizations to protect their networks. With hackers increasing and becoming smarter day by day, the need to utilize network security tool becomes more and more impotent. Network security is any activity designed to protect the usability and integrity of network and data. In fact, network security is a term used [...]

Brute Force Attack

2020-08-14T07:31:06+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

A brute force attack (exhaustive search) is a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered. This attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Brute force attacks don’t employ an intellectual strategy. These attacks simply try using [...]

IPsec Protocol

2020-09-26T06:28:52+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers/networks. IPsec is usually used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come from. Read more about encryption [...]

About Hashing And Its Applications

2020-09-26T06:31:03+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , |

We have already mentioned hashing in some posts, for example, in this post. We want to talk more about hashing now. Hashing data is a common practice in computer science and is used for several different purposes. Hashing is the practice of taking a string or input key, a variable created for storing narrative data, [...]

SSL and TLS

2020-09-24T11:41:19+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

In this post, we'll take a look at SSL protocol and TLS protocol to help you understand the different aspects of these protocols. One of the most important topics in Cyber-security course is web secure.     What’s SSL?  SSL (Secure Sockets Layer) is a protocol for establishing authenticated and encrypted links between networked computers. [...]

Wireless Security Protocols

2020-09-26T05:59:54+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. In this post, we'll take a look at wireless security protocols to help you understand the different aspects of these protocols. Source:  en.wikipedia.org There are several types of wireless security Protocol that you’ll come [...]

Cryptography- Part 4

2020-07-15T13:40:33+00:00Tags: , , , , , , , , , , , |

Cryptography- Part 4 Hashing Hash functions are primarily used to provide integrity. Hashing and cryptography have a very close relationship. A one-way function ensures that the same key can’t encrypt and decrypt a message in an asymmetric key system. A one-way function’s purpose is to ensure confidentiality. A one-way hashing algorithm produces a hashing [...]

Cryptography- Part 3

2020-07-15T13:36:17+00:00Tags: , , , , , , , , , , , , , , , , |

Cryptography- Part 3 Public Key Infrastructure (PKI) A PKI is an arrangement whereby a central authority stores encryption keys or certificates associated with users and systems. PKI is a key element in cryptography. The four basic components of a PKI are: Certificate Authority (CA): It comprises hardware, software, and the personnel administering the PKI. [...]

Go to Top