Authentication of decryption is applied. Encryption algorithms

Authentication is a process of verifying the identity of a
person/software connecting to an application. One of the simple form of authentication
contains secret password that must be presented when a user connects to the
DBMS system or application. But, passwords are easily compromised, so more
robust schemes are needed for critical data or applications such as online bank
accounts. Most of the applications use two-factor authentication, in which two
independent factors are used to identify a user and at the same time two
factors should not share a common vulnerability. In most of the two-factor
authentication schemes passwords are used as the first factor and smart cards
or other encryption devices are used as the second factor. Apart from the
two-factor authentication there are many types of authentication methods like
biometric authentication which uses physical characteristic such as ,
fingerprint, eye iris, or handprint to authenticate the user, Token-Bases
authentication and certificate based authentication.



We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Encryption refers to the process of
transforming data into a form which cannot be readable. unless the reverse
process of decryption is applied. Encryption algorithms

use an encryption key to perform
encryption, and require a decryption key (which

could be the same as the encryption
key depending on the encryption algorithm

used) to perform decryption. Previously
it was used for transmitting messages, using a secret key known only to the
sender and the intended receiver. Even if the message is intercepted by an
enemy, the enemy, not knowing the key, will not be able to decrypt and
understand the message which was sent. Encryption is widely used today for
protecting data in transit in a variety of applications such as data transfer
on the Internet, and on cellular phone networks. Encryption is also used to
carry out other tasks, such as authentication