0% found this document useful (0 votes)
32 views2 pages

Ias Exe8 Information System

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

Ias Exe8 Information System

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

lOMoARcPSD|9452196

IAS Exe8 - Information System

Information Management (AMA Computer University)

StuDocu is not sponsored or endorsed by any college or university


Downloaded by Leary John Tambagahan (learyjohntambagahan24@gmail.com)
lOMoARcPSD|9452196

TAMARRA HAROLD G.
BSIT-2B

1. What are cryptography and cryptanalysis?


Cryptography is the art of creating codes. Cryptanalysis is the art of surreptitiously revealing the
contents of coded messages, breaking codes, that were not intended for you as a recipient.
Secondly, there are nomenclators and enciphers.
2. What were some of the first uses of cryptography?
The scribe used some unusual hieroglyphic symbols here and there in place of more ordinary
ones. The purpose was not to hide the message but perhaps to change its form in a way which
would make it appear dignified.
3. What is a key, and what is it used for?
A key is a device that is used to operate a lock (such as to lock or unlock it).
4. What are the three basic operations in cryptography?
Encrypting, decrypting, and hashing are the three basic operations in cryptography.
5. What is a hash function, and what can it be used for?
hash function is any function that can be used to map data of arbitrary size to fixed-size values.
The values returned by a hash function are called hash values, hash codes, digests, or
simply hashes.

Downloaded by Leary John Tambagahan (learyjohntambagahan24@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy