• Skip to main content
  • Skip to primary sidebar
  • Computer Architecture
  • Computer Networks
  • DBMS
  • OS
  • Software Engineering
  • Security
  • OOT
binary-terms-logo

Binary Terms

The Computer Science & IT Guide

Security

Public Key Cryptography

Public Key Cryptography is a cryptographic technique that involves 'two distinct keys' for encryption and decryption. That's why it is also known as asymmetric-key cryptography. The public key cryptography is totally based on the 'invertible mathematical' function which makes it different from the conventional symmetric key cryptography. It is not that symmetric key … [Read more...] about Public Key Cryptography

RSA Algorithm in Cryptography

RSA is a first successful public key cryptographic algorithm. It is also known as an asymmetric cryptographic algorithm because two different keys are used for encryption and decryption. RSA is named after Rivest, Shamir and Adleman the three inventors of RSA algorithm. The algorithm was introduced in the year 1978. In this section, we will discuss, RSA algorithm along with … [Read more...] about RSA Algorithm in Cryptography

Fundamental Security Design Principles

The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents unwanted access to the system. Below is the list of fundamental security design principles provided by the National Centres of Academic Excellence in Information … [Read more...] about Fundamental Security Design Principles

Network Security Model

A Network Security Model exhibits how the security service has been designed over the network to prevent the opponent from causing a threat to the confidentiality or authenticity of the information that is being transmitted through the network. In this section, we will be discussing the general ‘network security model’ where we will study how messages are shared between the … [Read more...] about Network Security Model

Advanced Encryption Standard (AES)

Advanced Encryption Standard (AES) was introduced by NIST in 2001 is a symmetric block cipher which overcomes the key size weakness of DES. AES comes with the variable key sizes i.e. 128-bit key, 192-bit key and a 256-bit key. AES does not follow the Feistel structure in fact it operates on entire plaintext block at once instead of dividing them into two halves. AES can be … [Read more...] about Advanced Encryption Standard (AES)

Next Page »

Primary Sidebar

Most Searched Terms

  • Directory Structure
  • Contiguous Memory Allocation
  • Addressing Mode and its Types
  • Pipelining
  • Vector Processing
  • Register Organization
  • Direct Memory Access (DMA)
  • Process Control Block (PCB)
  • Swapping in Operating System
  • Relational Data Model

Recent Additions

  • Types of Processors
  • Demand Paging in Operating System
  • Agents and Environment in Artificial Intelligence
  • Array Processor in Computer Architecture
  • Deadlock Avoidance in Operating System
  • Fragmentation in Operating System
  • Assembly Language in Computer
  • Control Signals in Computer Architecture
  • Memory Hierarchy in Computer Architecture
  • Ethernet in Computer Networks

Categories

  • Artificial Intelligence
  • Cloud Computing
  • Compiler Design
  • Computer Architecture
  • Computer Networks
  • Data Warehouse and Mining
  • DBMS
  • Object Oriented Technology
  • Operating System
  • Security
  • Software Engineering

Copyright © 2026 · Binary Terms · Contact Us · About Us · Privacy