Beruflich Dokumente
Kultur Dokumente
Marks-60
BASICS OF E-COMMERCE
Both the sender and receiver have to know what set of rules (called
cipher) was used to transform original information in to its cipher text (code) form
– cipher text. Simple cipher might to be add an arbitrary number of characters to
all the character in the message.
Basically encryption has two parts:
• Algorithm – A cryptographic algorithm is a mathematical function.
• Key – string of digits.
Cryptographic algorithm combines the plain text or other intelligible information
with a string of digit called key’s to produce unintelligible cipher text. But some
encryption algorithms does not use a key.
Methods of Encryption: -
There are two methods for encryption: -
• Secret key or symmetric encryption – In this scheme, both the sender and
recipient possess the same key, to encrypt and decrypt the data.
• Public key or asymmetric encryption – This scheme operates on double key called
pair of keys, one of which is used to encrypt the message and the only the other
one in the is used to decrypt. This can be viewed as two part, one part of the key
pair, called private key known by the designated owner, the other part, called the
public key, is published widely but still associated with owner.
6
75. Explain:
1a. Firewalls :
2b. Proxy server
3c. VPN
BT0054- 02
Marks- 60
BASICS OF E-COMMERCE