Tuesday 12 April 2016

Ftp:

It stands for file transfer protocol. It provides the basic elements of file sharing between hosts. It uses TCP to create a virtual connection for central information and then create a separate TCP connection for data transfer.

Http:

It is an application level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information system. Here messages are passed in similar to internet mail model.

Shttp:

It stands for secure hyper text transfer protocol. It provides secure communication mechanism between Http client, server pair in order to enable regular commercial transactions for wide range of application.

Tcp/ip:

It stands for transmission control protocol or internet protocol. It helps in internet transmission between different system. These protocol are generally used in Van (Vast area network) Ex.internet.

Encryption and different types of encryption techniques:

Encryption is a process in which data is converted into a form called cipher text is converted completely into different cipher text form. To covert cipher text form or encrypted data back into its original form is called decryption. Thus encryption and decryption and decryption are two quite transformable forms.

The use of encryption/decryption is as old as art of communications. A cipher often incorrectly called as code examples Morse code and ASCII. More complex ciphers network according to sophisticated computer algorithms that rearrange the data bits in digital signals.

Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired circuits.

If the cipher is much harder for unauthorized people to break it thus encryption can also be defined as the transformation of data through a cryptographic mathematical process into a form that is unreadable by anyone who does not posses the appropriate secret key.

In general there are two types of Encryption techniques. They are:

1. SYMMETRIC CRYPTOGRAPHY
2.ASYMMETRIC CRYPTOGRAPHY

0 comments: