We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
lOMoARcPSD|9452196
IAS Exe8 - Information System
Information Management (AMA Computer University)
StuDocu is not sponsored or endorsed by any college or university
Downloaded by Leary John Tambagahan (learyjohntambagahan24@gmail.com) lOMoARcPSD|9452196
TAMARRA HAROLD G. BSIT-2B
1. What are cryptography and cryptanalysis?
Cryptography is the art of creating codes. Cryptanalysis is the art of surreptitiously revealing the contents of coded messages, breaking codes, that were not intended for you as a recipient. Secondly, there are nomenclators and enciphers. 2. What were some of the first uses of cryptography? The scribe used some unusual hieroglyphic symbols here and there in place of more ordinary ones. The purpose was not to hide the message but perhaps to change its form in a way which would make it appear dignified. 3. What is a key, and what is it used for? A key is a device that is used to operate a lock (such as to lock or unlock it). 4. What are the three basic operations in cryptography? Encrypting, decrypting, and hashing are the three basic operations in cryptography. 5. What is a hash function, and what can it be used for? hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes.
Downloaded by Leary John Tambagahan (learyjohntambagahan24@gmail.com)