Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Science Clay
Active In SP

Posts: 712
Joined: Jan 2009
01-03-2009, 02:10 PM


Security and privacy are critical for electronic communication and e-business. Network security measures are needed to protect data during its transmission. Cryptography plays a vital role in network security as it allows two parties to exchange sensitive information in a secured manner. The word cryptography means covered writingâ„¢. The art or science of transforming an intelligible message into unintelligible one and then retransforming that message back to its original form is cryptography. There are two types of cryptography: asymmetric cryptography and symmetric cryptography.

If the sender and the receiver use different keys. It is called asymmetric or multiple-key, public-key encryption. If the sender and the receiver use the same key it is called single key, secret-key or conventional encryption. It involves the use of a symmetric cryptography. secret key known only to the participants of the secure communication: If A wants to send a message to B, he encrypts the original message X by the encryption algorithm using the key agreed upon by them.

The encrypted message is through the communication media transmitted a secured and the key is transmitted through RF cable, fiber, tc.The receiver media like decrypts the original message from the encrypted message using the same key and the decryptor. A cryptanalyst may try to capture the message and the key. If he fails to do so, the encryption algorithm is successful.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1
Joined: Jul 2009
21-07-2009, 09:16 AM

please send the deatails of imbricate cryptography
my email is
Prasham Tated
Active In SP

Posts: 2
Joined: Jul 2010
31-07-2010, 11:08 AM

please give me ppt on imbricate cryptography

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: imbricate cryptography ppt download, full report on imbricate cryptography, imbricate cryptography ppt, ppts of imbricate cryptography, paper presentation on imbricate cryptography, ppt imbricate cryptography,
Popular Searches: imbricate cryptography for network security, cryptography forcekeyprotection, imbricate cryptography, isabelle dechene cryptography, palladim cryptography, imbricate cryptography paper presentation, cryptography csp noprivatekey,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Elliptical curve cryptography (ECC) computer science crazy 6 6,386 31-03-2014, 08:33 PM
Last Post: Guest
Last Post: Guest
  CHAOTIC QUANTUM CRYPTOGRAPHY pdf study tips 0 307 09-09-2013, 03:31 PM
Last Post: study tips
  A Probabilistic Model of Visual Cryptography Scheme with Dynamic Group report study tips 0 587 05-06-2013, 01:02 PM
Last Post: study tips
  Number Theory Algorithms and Cryptography Algorithms PPT study tips 0 373 20-05-2013, 04:25 PM
Last Post: study tips
  Cryptography and Network Security Report study tips 0 501 25-02-2013, 03:36 PM
Last Post: study tips
  ppt on Cryptography study tips 0 412 14-02-2013, 10:48 AM
Last Post: study tips
  CRYPTOGRAPHY and SECURITY seminar tips 0 393 13-02-2013, 04:46 PM
Last Post: seminar tips
  Embedded Extended Visual Cryptography Schemes seminar tips 0 371 12-02-2013, 04:04 PM
Last Post: seminar tips
  SEMINAR QUANTUM CRYPTOGRAPHY pdf project girl 0 473 07-02-2013, 04:39 PM
Last Post: project girl