Search
+
Business News›Definitions›Security›Decryption
Categories
Suggest a new Definition
Proposed definitions will be considered for inclusion in the Economictimes.com
Definition: The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.
Description: One of the reasons for implementing an encryption-decryption system is privacy. As information travels over the Internet, it is necessary to scrutinise the access from unauthorized organisations or individuals. Due to this, the data is encrypted to reduce data loss and theft. Few common items that are encrypted include text files, images, e-mail messages, user data and directories. The recipient of decryption receives a prompt or window in which a password can be entered to access the encrypted data. For decryption, the system extracts and converts the garbled data and transforms it into words and images that are easily understandable not only by a reader but also by a system. Decryption can be done manually or automatically. It may also be performed with a set of keys or passwords.
There are many methods of conventional cryptography, one of the most important and popular method is Hill cipher Encryption and Decryption, which generates the random Matrix and is essentially the power of security. Decryption requires inverse of the matrix in Hill cipher. Hence while decryption one problem arises that the Inverse of the matrix does not always exist. If the matrix is not invertible then the encrypted content cannot be decrypted. This drawback is completely eliminated in the modified Hill cipher algorithm. Also this method requires the cracker to find the inverse of many square matrices which is not computationally easy. So the modified Hill-Cipher method is both easy to implement and difficult to crack.
Related Definitions
- AuthenticationAuthorization
Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a set of identifying credentials. The credentials provided are compared to those on a file in a database of the authorized user’s information on a local operating system or within an authentication server.Description: The authentication process always runs at the start of t
Buffer OverflowAuthorization is a security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features. This is the process of granting or denying access to a network resource which allows the user access to various resources based on the user's identity.Description: Most web security systems are based on
CiphertextBuffer overflow occurs when a program tries to store more data in a temporary storage area than it can hold. Writing outside the allocated memory area can corrupt the data, crash the program or cause the execution of malicious code that can allow an attacker to modify the target process address space.Description: Buffer overflow occurs when data that is written to buffer ends up corrupting data
Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output of an encryption algorithm. The term "cipher" is sometimes used as an alternative term for ciphertext. Ciphertext is not understandable until it has been converted into plain text using a key.Description: Earlier cipher algorithms were performed manually and were entirely different from modern al
- ClickjackingComputer Virus
Clickjacking is a phenomenon of hijacking "clicks" in a website context. It is vulnerability in the user interface of the websites. It can occur in any browser on any platform. As the name implies this vulnerability hijacks the clicks of a user on a website which effectively translates into leading a user click on something malicious or sharing confidential information details he is not even aware
Computer WormA computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.Description: The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally. They are always induced by people. Once created and released, however, their diffusion is not directly under human control. After
Cross-site Request ForgeryA computer worm is a malicious, self-replicating software program (popularly termed as 'malware') which affects the functions of software and hardware programs.Description: It fits the description of a computer virus in many ways. For example, it can also self-replicate itself and spread across networks. That is why worms are often referred to as viruses also. But computer worms are different fr
Cross-Site Request Forgery - also known as CSRF, XSRF or Cross Site Reference Forgery - is a type of attack that happens when a malicious website delegates its request to another website or web application where the user is authenticated. The attacker can access whole or partial functionality of the website via the victim's authenticated browser.Description: The sites that are more likely to be
- Cross-site ScriptingCryptography
Cross-site scripting (XSS) is a type of computer security vulnerability. It is accounted for almost 85% of all website security vulnerabilities.Description: Cross-site scripting (XSS) exploits the 'same-origin-policy' concept of web applications to allow hackers to extract information from the system.How it works: Attackers conduct script injection that runs at the client side and is sometimes
Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.Description: Earlier cryptography w
Related News
- Despite legal implication, some companies pay the ransom demanded by WannaCryThough lawyers and experts have been advising companies to not pay bitcoins, some Indian companies are believed to have gone ahead and paid the ransom.
- National Security Agency of USA hacked Pakistani mobile networks: WikiLeaks"Hundreds of NSA cyber weapons variants publicly released including code showing hacking of Pakistan mobile system," WikiLeaks tweeted.
- How to permanently erase data from an Android deviceIt's a common misconception that doing a 'Factory Reset' is the ultimate way of securely deleting data from a smartphone.