Cryptography

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 7 of 18 - About 180 Essays
  • Improved Essays

    Password strength Password complexity policies are designed to deter brute force attacks by increasing the number of possible passwords. When password complexity policy is enforced, new passwords must meet the following guidelines: • The password does not contain a dictionary word or the account name of the user or company. • The password is at least eight (8) characters long and can be up to 128 characters long. • The password contains characters from three of the following four categories: o…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Title: Brute-forcing a Password Topic: The experiment will be used to determine the effectivity of several lengths and arrangements of encryptions. Introduction: In this age of revolutionary technologies, our lives are essentially saved to the Internet and upon electronic devices. Our most personal informations and even our secrets are preserved in a digital format on various hard drives and storages across the globe. These devices, if not properly secured, are accessible to practically…

    • 452 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /*************************** Kerberos authentication protocol that establishes a trusted connection between hosts in the untrusted…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Gibberish Codes

    • 276 Words
    • 2 Pages

    What defines a code is, a system of words, letters, figures or symbols used to replicate a realistic message, which can convey meaning/clues to people. They are generally used for secrecy. Codes function by exchanging given words, letters, figures or symbols into the realistic language that everyone is familiar with. Rather, simultaneously cracking gibberish codes until it reveals a somewhat revealing message. Innumerable codes have been introduced to the world, yet only a few have stood out,…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Zigbee Attack Essay

    • 1404 Words
    • 6 Pages

    packets. This will drain the battery of the Zigbee module and can be used to disable the device [9]. The second and most overlooked attack is a physical attack on the actual Zigbee device. Zigbee devices are not very secure. They often store the network key information in plain text without encryption or password protection. Simple AT commands can often be used to retrieve this information if the device is physically accessible. All Zigbee devices in the network have access to the encryption…

    • 1404 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Security and integrity, as well as the privacy of user data, remain an important aspect of any computing-related business. Considering that all businesses have turned to technology in a bid to enhance efficiency, it is common to face security related issues. Cloud robotics which is one of the algorithmic processes is a good example of what can be attained using algorithms. This paper is bent on focusing on practical differences in which algorithms are used in solving problems (phishing) through…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Android Security Essay

    • 1462 Words
    • 6 Pages

    Analysis of Android Security 2. Application Signing and Distribution • ANDROID- Application signing is done to maintain the identity of the author or the developer of the application. Google ensures that the author or the vendor of the application signs the application with their key as their identity. Developers are required to sign their applications digitally using their private key and through this signature, trust is developed between Google and developers. All applications must be…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    to an extent through the encryption of data and proper access control management. Still even with these security measures in place, dubious attackers can breach the security measures and gain access to the data in the following ways [4]. • Cross-site scripting • Cross-site request forgery • Cookie manipulation • OS and SQL injection • Insecure storage • Hidden field manipulation Due to the vulnerabilities listed above, achieving data security in cloud remains a mammoth task. 1) Network…

    • 1432 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The Quotient Ring Transform is an alternate encoding and decoding process developed by Dr. Anna Johnston [5]. The utility of this error detection and correction process is that it is not dependent on a fixed set of primitive roots. Thus, a standard encryption procedure can be efficiently included in the process. This section lays out Dr. Johnston’s work and provides a simple worked example. 3.1 The Chinese Remainder Theorem Recall the standard statement of the Chinese Remainder Theorem [1]:…

    • 1385 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    The Counterfeit Coins Problem is a well-known complex search problem in mathematics as well as in computer science. It can be related to the data structure (such as binary tree) computer program, algorithm, Graph Theory, Therefore researching this problem is meaningful. The Counterfeit Coins problem can be described as given a set of n look-alike Coins containing One Counterfeit which is a bit heavier or lighter than the genuine Coins. The objective is to find the Counterfeit Coins in minimum…

    • 1802 Words
    • 8 Pages
    Great Essays
  • Page 1 4 5 6 7 8 9 10 11 18