Sign Up

Captcha Click on image to update the captcha.

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

You must login to add post.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Find Authority

Find Authority Logo Find Authority Logo

Find Authority Navigation

  • Home

Mobile menu

Close
Ask a Question
  • Home
  • Recent Questions
  • Topics
  • Home
Home/Questions/Q 2038
Next
In Process
Anonymous
  • 0
Anonymous
Asked: December 24, 20192019-12-24T18:06:03+00:00 2019-12-24T18:06:03+00:00In: Telecommunications

What are the main components of encryption for confidentiality model?

  • 0

Encryption is changing of plaintext to another text, using a key, which cannot be comprehended by anyone until it is decoded. By encryption, one can get confidential data, which is not available for public or unauthorised users.

networking
  • 1 1 Answer
  • 0
Share
  • Facebook

    Leave an answer
    Cancel reply

    You must login to add an answer.

    Forgot Password?

    Need An Account, Sign Up Here

    1 Answer

    • Oldest
    1. Shahkar Level 5
      2019-12-24T18:12:51+00:00Added an answer on December 24, 2019 at

      For proper encryption of some data, one must need to understand the various elements involved in encryption, such as plaintext, ciphertext, key, encryption, and decryption.

      Plaintext

      The plaintext is the normal text or original message that needs to be sent from one user to another, without any interference. The plaintext is available only to the sender, and it will become visible to a receiver when it is deciphered using a specific key.

      Ciphertext

      The ciphertext is the text that comes out when plaintext is incorporated with a key using some specific algorithm. This text is available for all users on the network, but the message cannot be understood by anyone, as it is encoded by using the key. It can only be deciphered by the receiver.

      Key

      Key is an important component of encryption. It is used in both encryption and decryption of the message. There are two ways to use a key in encryption and decryption, symmetric and asymmetric.

      In symmetric key distribution, the same key is used for both encryption and decryption, while in asymmetric two separate keys (public and private) are used for encryption (public) and decryption (private).

      Encryption

      As explained earlier, encryption is the techniques used to encode a message in a form that can only be understood when it is decoded. It is completed on the sender side, and after encryption, the encoded message is sent to the receiver. If someone accesses the information in the network between sender and receiver, the person would struggle to get the original message.

      Decryption

      Decryption is processed on the receiver side, where user decrypts the encoded message using the key (same or different) that is shared by the sender. After the decryption of ciphertext receiver will be able to see the original message, which has not interfered.

      All of the defined elements play a very important role in sending the message in untempered from one place to another. If any of the elements are not used properly, it can cause problems to the encryption of confidential information.

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp

    Sidebar

    Advanced Search
    Ask A Question

    Related Questions

    • How big is the global mobile middleware market?

    • What is the global mobile device management market size?

    • What is the size of the global fiber optic cable ...

    • How big is the global mobile virtualization market?

    • What are the applications of memristors?

    Explore

    • Home
    • Recent Questions
    • Topics

    Footer

    Find Authority

    Find Authority

    Find Authority is a professional networking and crowdsourcing platform which helps enhance members credentials and create opportunities.

    About Us

    • About Us
    • Careers
    • Contact Us

    Legal Stuff

    • Terms and Conditions
    • Privacy Policy
    • Cookie Policy

    Supprt

    • Help Centre
    • Badges

    Follow

    © 2020 Find Authority. All Rights Reserved

    Insert/edit link

    Enter the destination URL

    Or link to existing content

      No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.