Is the process of converting a data or information into another form also known as cipher text?

Recommended textbook solutions

Is the process of converting a data or information into another form also known as cipher text?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Is the process of converting a data or information into another form also known as cipher text?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Is the process of converting a data or information into another form also known as cipher text?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Is the process of converting a data or information into another form also known as cipher text?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Suggest a new Definition

Proposed definitions will be considered for inclusion in the Economictimes.com


Definition: The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.

Description: One of the reasons for implementing an encryption-decryption system is privacy. As information travels over the Internet, it is necessary to scrutinise the access from unauthorized organisations or individuals. Due to this, the data is encrypted to reduce data loss and theft. Few common items that are encrypted include text files, images, e-mail messages, user data and directories. The recipient of decryption receives a prompt or window in which a password can be entered to access the encrypted data. For decryption, the system extracts and converts the garbled data and transforms it into words and images that are easily understandable not only by a reader but also by a system. Decryption can be done manually or automatically. It may also be performed with a set of keys or passwords.

There are many methods of conventional cryptography, one of the most important and popular method is Hill cipher Encryption and Decryption, which generates the random Matrix and is essentially the power of security. Decryption requires inverse of the matrix in Hill cipher. Hence while decryption one problem arises that the Inverse of the matrix does not always exist. If the matrix is not invertible then the encrypted content cannot be decrypted. This drawback is completely eliminated in the modified Hill cipher algorithm. Also this method requires the cracker to find the inverse of many square matrices which is not computationally easy. So the modified Hill-Cipher method is both easy to implement and difficult to crack.

  • PREV DEFINITION

  • NEXT DEFINITION

    Glossary

encryption

Definition(s):

  The cryptographic transformation of data to produce ciphertext.
Source(s):
CNSSI 4009-2015 from ISO/IEC 7498-2
NIST SP 1800-21B under Encryption from CNSSI 4009-2015
NIST SP 800-12 Rev. 1 under Encryption from ISO 7498-2

  Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data’s original meaning to prevent it from being known or used. If the transformation is reversible, the corresponding reversal process is called “decryption,” which is a transformation that restores encrypted data to its original state.
Source(s):
NIST SP 800-82 Rev. 2 under Encryption from RFC 4949

  Any procedure used in cryptography to convert plain text into cipher text to prevent anyone but the intended recipient from reading that data.
Source(s):
NIST SP 800-101 Rev. 1 under Encryption
NIST SP 800-72 under Encryption

  The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
Source(s):
NIST SP 800-133 Rev. 2 under Encryption
NIST SP 800-57 Part 1 Rev. 5 under Encryption
NIST SP 800-57 Part 2 Rev.1 under Encryption

  The process of transforming plaintext into ciphertext.
Source(s):
NIST SP 800-20 under Encryption
NIST SP 800-67 Rev. 2 under Encryption

  The process of a confidentiality mode that transforms usable data into an unreadable form.
Source(s):
NIST SP 800-38A under Encryption (Enciphering)

  The process of transforming plaintext into ciphertext using a cryptographic algorithm and key.
Source(s):
NIST SP 800-56B Rev. 2 under Encryption

  The process of changing plaintext into ciphertext using a cryptographic algorithm for the purpose of security or privacy.
Source(s):
NIST SP 800-175B Rev. 1 under Encryption

  The process of changing plaintext into ciphertext.
Source(s):
NISTIR 7621 Rev. 1 under Encryption from CNSSI 4009-2015, ISO/IEC 7498-2

Is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event?

What are Backups? In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.

Is the term used to describe an individual's anonymity and how safe they feel in a website location?

With the Internet, privacy describes an individual or group's control over their selective anonymity and how safe they feel about the storage and sharing of information.

Is any software package which automatically renders advertisements in order to generate revenue for its author?

Adware: As defined by Wikipedia: “Adware, or advertising-supported software, is any software package that automatically renders advertisements in order to generate revenue for its author.