Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 8, Problem 1RQ

Explanation of Solution

Cryptography and cryptanalysis:

  • Cryptography is a technique to convert the plain text to cyber text to protect the data from hackers.
  • Cryptanalysis is the art of study to decrypt the cyber text without knowing the key.

Cryptography:

Cryptography is a technique to encrypt and decrypt the data using keys. The user can send or receive data across insecure networks using the cryptography. This system may use same or different keys for sender and receiver.

This technique can be categorized into two types:

  • Symmetric key cryptography.
  • Asymmetric key cryptography.

Symmetric key cryptography:

This cryptography uses the same secret key for sender and receiver to encrypt and decrypt the message.

Asymmetric key cryptography:

The sender and receiver uses different keys for encryption and decryption. It is otherwise known as public key cryptography.

Cryptanalysis:

Cryptanalysis is a study of retrieving plain text from a cipher text without knowing the encryption key and algorithm used to encrypt it. This art used to defeat cryptographic security and gain access to the contents of encrypted messages. The cryptanalysts may responsible for following things:

  • Design the security systems to prevent the vulnerabilities.
  • Evaluate and analyze the security systems and algorithm for cryptography.
  • Protecting critical data from being modified and deleted.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What is cryptanalysis and cryptography?
What is the process of cryptography?
What is Cryptanalysis?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,