• Skip to main content
  • Skip to primary sidebar
  • Computer Architecture
  • Computer Networks
  • DBMS
  • OS
  • Software Engineering
  • Security
  • OOT
binary-terms-logo

Binary Terms

The Computer Science & IT Guide

Fundamental Security Design Principles

9th May 2020 by Neha T Leave a Comment

The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents unwanted access to the system. Below is the list of fundamental security design principles provided by the National Centres of Academic Excellence in Information … [Read more...] about Fundamental Security Design Principles

Network Security Model

7th May 2020 by Neha T Leave a Comment

A Network Security Model exhibits how the security service has been designed over the network to prevent the opponent from causing a threat to the confidentiality or authenticity of the information that is being transmitted through the network. In this section, we will be discussing the general ‘network security model’ where we will study how messages are shared between the … [Read more...] about Network Security Model

Advanced Encryption Standard (AES)

5th May 2020 by Neha T Leave a Comment

Advanced Encryption Standard (AES) was introduced by NIST in 2001 is a symmetric block cipher which overcomes the key size weakness of DES. AES comes with the variable key sizes i.e. 128-bit key, 192-bit key and a 256-bit key. AES does not follow the Feistel structure in fact it operates on entire plaintext block at once instead of dividing them into two halves. AES can be … [Read more...] about Advanced Encryption Standard (AES)

Feistel Block Cipher

25th April 2020 by Neha T 1 Comment

Feistel block cipher is a structure used to derive many symmetric block ciphers such as DES which we have discussed in our previous content. Feistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa. In the Feistel block cipher, each block has to undergo many rounds where each round … [Read more...] about Feistel Block Cipher

Block Cipher

23rd April 2020 by Neha T 2 Comments

Block cipher is an encryption and decryption method which operates on the blocks of plain text, instead of operating on each bit of plain text separately. Each block is of equal size and has fixed no of bits. The generated ciphertext has blocks equal to the number of blocks in plaintext and also has the same number of bits in each block as of plain text. Block cipher uses the … [Read more...] about Block Cipher

Data Encryption Standard (DES)

21st April 2020 by Neha T 1 Comment

Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology (NIST) in the 1970s. Initially, DES was only used in financial applications but later it was accepted as the cryptographic algorithm by other organizations too. Being a symmetric … [Read more...] about Data Encryption Standard (DES)

Transposition Technique in Cryptography

13th April 2020 by Neha T Leave a Comment

Transposition technique is an encryption method which is achieved by performing permutation over the plain text. Mapping plain text into cipher text using transposition technique is called transposition cipher. In this section, we will discuss variations of transposition technique, and we will also observe how the transposition technique is different from the substitution … [Read more...] about Transposition Technique in Cryptography

Substitution Technique in Cryptography

11th April 2020 by Neha T 1 Comment

Substitution technique is a classical encryption technique where the characters present in the original message are replaced by the other characters or numbers or by symbols. If the plain text (original message) is considered as the string of bits, then the substitution technique would replace bit pattern of plain text with the bit pattern of cipher text. We will discuss … [Read more...] about Substitution Technique in Cryptography

Difference Between Black Box Testing and White Box Testing

7th April 2020 by Neha T Leave a Comment

Black box testing and white box testing both are the methods of testing the software. But, the main difference between black box and white box is that the black box testing checks the functionality of the software (external view) whereas, the white box testing, tests the internal structure or procedural design (internal view) of the software. Black box testing and white box … [Read more...] about Difference Between Black Box Testing and White Box Testing

Basis Path Testing

1st April 2020 by Neha T Leave a Comment

Basis path testing derives the number of 'test cases' that can be designed to exercise each & every statement in the program at the minimum once while testing is conducted to uncover all the possible errors of the program. Basis path testing is a method of testing the control structure of conventional software. In this section, we will discuss the steps for conducting … [Read more...] about Basis Path Testing

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 11
  • Go to page 12
  • Go to page 13
  • Go to page 14
  • Go to page 15
  • Interim pages omitted …
  • Go to page 18
  • Go to Next Page »

Primary Sidebar

Most Searched Terms

  • Directory Structure
  • Contiguous Memory Allocation
  • Addressing Mode and its Types
  • Pipelining
  • Vector Processing
  • Register Organization
  • Direct Memory Access (DMA)
  • Process Control Block (PCB)
  • Swapping in Operating System
  • Relational Data Model

Recent Additions

  • Agile Development Model  
  • Software Robustness
  • Data Structure Design
  • Scheduling in Operating System
  • Process in Operating System
  • System Call in Operating System
  • Operating System Structure
  • Specification of Tokens
  • Intermediate Code Generation
  • Bottom-Up Parsing in Compiler Design

Categories

  • Cloud Computing
  • Compiler Design
  • Computer Architecture
  • Computer Networks
  • Data Warehouse and Mining
  • DBMS
  • Object Oriented Technology
  • Operating System
  • Security
  • Software Engineering

Copyright © 2022 · Binary Terms · Contact Us · About Us · Privacy