Cryptography Components & Network Security Model | Plaintext | Ciphertext | Encryption | Decryption

Cryptography Components & Network Security Model | Plaintext | Ciphertext | Encryption | Decryption | Pinnacle Bhagyashree Thorat | SPPU TE COMP | SPPU TE IT...

Pinnacle !! Bhagyashri Thorat148 views8:34

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in South Korea under the topic 'cybersecurity news today'.

About this video

Cryptography Components & Network Security Model | Plaintext | Ciphertext | Encryption | Decryption | Pinnacle Bhagyashree Thorat | SPPU TE COMP | SPPU TE IT | SPPU IT ENTC Hello students, If you are not aware of the introduction to cryptography components and model for network security then this video is for you. I am Bhagyashri Thorat welcome to my channel pinnacle thanks to subscribe my channel. Those are new to this topic please refer to the videos on why we need network security which are already published on my channel. Network Security! Human Security! Computer Security! Security Policy https://youtu.be/4SpCjxPPM-8 When we send our data from the source side to the destination side we have to use some transfer method like the internet or any other communication channel by which we are able to send our message. The two parties, who are the principals in this transaction, must cooperate for the exchange to take place. When the transfer of data happened from one source to another source some logical information channel is established between them by defining a route through the internet from source to destination and by the cooperative use of communication protocols (e.g., TCP/IP) by the two principals. When we use the protocol for this logical information channel the main aspect of security has come. who may present a threat to confidentiality, authenticity, and so on. All the techniques for providing security have two components: 1) security-related transformation on the information to be sent. 2) Some secret information is shared by the two principals and, it is hoped, unknown to the opponent. A trusted third party may be needed to achieve secure transmission. For example, a third party may be responsible for distributing the secret information to the two principals while keeping it from any opponent. Or a third party may be needed to arbitrate disputes between the two principals concerning the authenticity of a message transmission. This model shows that there are four basic tasks in designing a particular security service: Design an algorithm for performing the security-related transformation. Generate the secret information to be used with the algorithm. Develop methods for the distribution and sharing of secret information. Specify a protocol to be used by the two principals that make use of the security algorithm and the secret information to achieve a particular security service. source : https://www.geeksforgeeks.org/a-model-for-network-security/

Video Information

Views
148

Total views since publication

Duration
8:34

Video length

Published
Mar 26, 2023

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.