Electronic Data Interchange in Cyber Security

What is Electronic Data Interchange in E-Commerce? EDI stands for electronic data interchange refers to the computer exchange of structural business information in a standard electronic format. Using EDI, the various trading partners can establish links between their computers to exchange information electronically. EDI may also be defined as the transfer of structured data between […]

Electronic Data Interchange in Cyber Security Read More »

Digital Signature in Cryptography & Network Security

What is Digital Signature and how it works? It is a mathematical stream for demonstrating the authenticity of Digital Signature or documents. A valid signature gives a receipt reason to believe that the message was created by a known sender such that the sender cannot deny having sent the message and the message was not

Digital Signature in Cryptography & Network Security Read More »

Caesar Cipher Substitution Technique with Example

In cryptography, substitution is a technique in which plaintext letters are replaced with other letters, numbers, or symbols. Substitution includes substituting plaintext bit patterns with ciphertext bit patterns if the plaintext is considered as a sequence of bits. Caesar Cipher is one of the substitution techniques first used by Julius Caesar. Caesar Cipher The Caesar

Caesar Cipher Substitution Technique with Example Read More »

Scroll to Top