抽象的

Cryptography and its two Implementation Approaches

Gagandeep shahi, Charanjit singh

Abstract:In the modern digital world inviolability of the crucial facts is an essential part for data security. The entire world becoming a village due to the digital data conveys through network of networks called internet. With availability of network everywhere the common man perform transactions such as buying and selling the products called ecommerce, cash submission and withdrawal from bank with the help of e-banking etc. Network may be insecure where the people transmitting their decisive data, valuable information in the form of conspicuous passwords etc. Third parties like hackers who do not have the authority can hack the data. They can destroy confidentiality of the facts, integrity of the facts as well as availability ofthe facts. To prevent this, cryptography must be there. In this paper we will discuss about the cryptography and its two implementation approaches Known as Peer to Peer (P2P) Trusted Third Party Cryptography Approaches which is based upon Client Server Computing.

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证