Cryptology is the study of codes, both creating and solving them. Cryptography is the art of creating codes.
In Short, cryptology is comprised of cryptography and cryptanalysis. The main, cryptography, is the real verifying, control, and ID of computerized information. The second, cryptanalysis, is comprised of the considerable number of endeavors one may create to undermine, dodge, as well as break what the initial segment, cryptography, is endeavoring to achieve.
Cryptology Combines the Techniques of Cryptography and Cryptanalysis
![]() |
Cryptology |
Cryptology Combines the Techniques of Cryptography and Cryptanalysis
Encryption Algorithm
MD5 - is Stands for Message-Digest 5. It is utilized to make 128-piece Hash Values. Hypothetically, hashes can't be switched into the first plain content, MD5 is utilized to encode passwords just as check information honesty, MD5 isn't Collision safe, conspiracy opposition is the troubles in discovering two qualities that produce a similar hash esteems.
SHA - This is the abbreviation for secure Hash Algorithm are utilized to produce dense portrayal of a (message digest). It has different forms Such as:
SHA-1 - Produces 160-bit Hash esteems. It is like prior to prior variant of MD5. It has cryptographic shortcoming and isn't prescribed for use since the year 2010.
SHA-2 - It has two Hash Functions Namely SHA-256 and SHA-512, SHA-256 uses 32-bit words while SHA-512 uses 64-bits words
SHA-3 - This algorithm is genrally known as KECCEK
RC4 - This calculation is utilized to make stream Ciphers. It is for the most part utilized in conventions, for example, Secure Socket Layer (SSL) to encode web correspondence and Wired Equivalent Privacy (WEP) to verify Wireless Networks
Blowfish - This Algorithm is utilized to make Keyed, Symmetrically Blocked Ciphers. It very well maay be utilized to Encrypt Passwords and other Data.
COMMENTS