Now, Cryptosystems are used to give protection to the sensitive information when it is shared among the users through internet. It will encode the information and only authorized users can decrypt that encrypted text. The encrypted text is called as Cipher Text. Cryptosystems plays a very important role in the electronic information exchange field. The financial institutions and banks are using cryptography method to secure the transmission of critical, sensitive and private information through the Internet. Now secure and reliable exchange systems are very essential for the world’s economy during the e-commerce explosion.
Cryptosystems will use hardware and software components in a process that secures the sensitive data by doing some mathematical calculations/algorithms on it. We will get Cipher text as result after performing this cryptography method. Then this cipher text is transmitted to its destination through Internet, which is unsecured. But unauthorized users cannot decrypt this text and not get to know about this sensitive information. If he opens it, text will appear indecipherable or meaningless to him. After cipher text reaches its destination, it will be decrypted into the original state of the data by authorized user.
Operating System: Windows 2000/XP
Java Development Kit (JDK) 1.5.0
Processor: Pentium III/AMD Athlon XP Processor
RAM: Minimum 128 M or more
Hard disk: Minimum 20 GB or more
FDD: Minimum 1.44MB
Monitor: Minimum14 inch LCD screen
Mouse: 3 Button scroll
CD Drive: 52 X
Keyboard: 108 keys🔥75 Views