What are the functions and roles of a Mental Performance Consultant? What do you think are the most important therapeutic goals?
In today’s technology, securing a system is an essential issue. Numerous procedures are given to secure system. Cryptographic is a strategy of changing a message into such frame which is ambiguous, and afterward retransforming that message back to its unique shape. If you want to keep your information safe and secret, you have the possible strategies are: hide the existence of the information or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Cryptography is a method used to store and transmit data in a secret form so that only those for whom it is intended can read and process it. Keywords: RSA (Rivest Shamir Aldeman), El-gamal, Asymmetric cryptography, Public Key. INTRODUCTION With the globalization in the e-commerce, where everything is digital and is done online, may it be online shopping, money transfer, e-banking, e-voting, e- registration, sending email, security is the main priority. Reliance on electronic communications makes information vulnerable to unauthorized users. Hence the users need confidentiality, message integrity, sender non-repudiation and sender and authentication Cryptography Goals Listed below are the five main reasons what Encryption is implemented for: a. Authentication: This can be achieved in two ways: Peer entity Authentication and Data Origin Authentication b. Privacy/Confidentiality: This is to protect data from unauthorized access, may it be whole messages, part of data and even existence of a message. With this, data transmission can be combatted via passive attacks. c. Integrity: This is to ensure that the receiver receives the data just the way it was intended without any alteration. Basically, this is achieved by check sum of IPv4 packets. d. Non-repudiation: When the message is transferred, the receiver can prove that it was sent by a particular sender. This confirms that neither sender or receiver denies for sending/receiving a message e. Service Reliability and Availability: The online systems can easily be attacked by hackers, intruders and that can affect the services to the system users. Asymmetric Cryptography>GET ANSWER