Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Suggest a new Definition
Proposed definitions will be considered for inclusion in the Economictimes.com
Definition: The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.
Description: One of the reasons for implementing an encryption-decryption system is privacy. As information travels over the Internet, it is necessary to scrutinise the access from unauthorized organisations or individuals. Due to this, the data is encrypted to reduce data loss and theft. Few common items that are encrypted include text files, images, e-mail messages, user data and directories. The recipient of decryption receives a prompt or window in which a password can be entered to access the encrypted data. For decryption, the system extracts and converts the garbled data and transforms it into words and images that are easily understandable not only by a reader but also by a system. Decryption can be done manually or automatically. It may also be performed with a set of keys or passwords.
There are many methods of conventional cryptography, one of the most important and popular method is Hill cipher Encryption and Decryption, which generates the random Matrix and is essentially the power of security. Decryption requires inverse of the matrix in Hill cipher. Hence while decryption one problem arises that the Inverse of the matrix does not always exist. If the matrix is not invertible then the encrypted content cannot be decrypted. This drawback is completely eliminated in the modified Hill cipher algorithm. Also this method requires the cracker to find the inverse of many square matrices which is not computationally easy. So the modified Hill-Cipher method is both easy to implement and difficult to crack.
PREV DEFINITION
NEXT DEFINITION
Related News
- Glossary
encryption
Definition(s):
The cryptographic transformation of data to produce ciphertext.
Source(s):
CNSSI 4009-2015 from ISO/IEC 7498-2
NIST SP 1800-21B under Encryption from
CNSSI 4009-2015
NIST SP 800-12 Rev. 1 under Encryption from ISO 7498-2
Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data’s original meaning to prevent it from being known or used. If the transformation is reversible, the corresponding reversal process is called “decryption,” which is a transformation that restores encrypted data to its original state.
Source(s):
NIST SP 800-82 Rev. 2 under Encryption from RFC 4949
Any procedure used in cryptography to convert plain text into cipher text to prevent anyone but the
intended recipient from reading that data.
Source(s):
NIST SP 800-101 Rev. 1 under Encryption
NIST SP 800-72
under Encryption
The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
Source(s):
NIST SP 800-133 Rev.
2 under Encryption
NIST SP 800-57 Part 1 Rev. 5 under Encryption
NIST SP 800-57 Part 2 Rev.1
under Encryption
The process of transforming plaintext into ciphertext.
Source(s):
NIST SP 800-20 under Encryption
NIST SP 800-67 Rev. 2 under Encryption
The process of a confidentiality mode that transforms usable data into an unreadable form.
Source(s):
NIST SP 800-38A under Encryption (Enciphering)
The process of transforming plaintext into ciphertext using a cryptographic algorithm and key.
Source(s):
NIST SP 800-56B Rev. 2 under Encryption
The process of changing plaintext into ciphertext using a cryptographic algorithm for the purpose of security or
privacy.
Source(s):
NIST SP 800-175B Rev. 1 under Encryption
The process of changing plaintext into ciphertext.
Source(s):
NISTIR 7621 Rev. 1 under Encryption from CNSSI 4009-2015, ISO/IEC 7498-2