ARTIFICIAL INTELLIGENCE

Artificial Intelligence Study Material.

Read More

DATA MINING

Data Mining Study Material

Read More

IOT

Internet of Things Study Material Coming Soon.

Read More

HMAC

WHAT IS HMAC? The full form of HMAC IS Hash Based Message Authentication Code. HMAC = H (K Ꚛ OPAD, H (K Ꚛ IPOD, MESSAGE m)) Where HMAC = final output K = secret key Ꚛ = XOR Operation M = input message m OPAD & IPOD = fixed & different 64 byte string repeated

Read More

Authentication Function

MESSAGE AUTHENTICATION

DEFINITION MESSAGE AUTHENTICATION is provide by the secret keys that is done in case of encryption. MESSAGE AUTHENTICATION is concerned with  ► Protecting integrity of message ► Validating identity of originator ► Non-repudiation of origin. FUNCTIONS OF MESSAGE AUTHENTICATION. There are three functions. DEFINE 1. HASH FUNCTION A feature that maps a message of any size into a constant length hash value,

Read More

EASY AND SIMPLE PHONE BOOK APPLICATION USING C PROGRAMMING LANGUAGE

INTRODUCTION A EASY AND SIMPLE PHONE BOOK APPLICATION USING C PROGRAMMING LANGUAGE WHICH YOU CAN USE IN YOUR COLLEGE PROJECT. In this project you can create a simple phonebook application in c. The below program will might help you to understood the code better. FROM This program is written in C ++ The IDE which

Read More

KERBEROS REALM

WHAT IS KERBEROS? ▶ It is a trusted key system from MIT. ▶ It provides centralized private key, third-party authentication in a distributed network. DEFINITION: A KERBEROS REALM is an environment consists of a Kerberos server, number of clients of a Kerberos server, number of clients, registered with server & application servers, sharing keys with

Read More

KERBEROS.

◉ INTRODUCTION: In this article, I will give SHORT NOTE ON KERBEROS. ▶ It is a trusted key system from MIT. ▶ It provides centralized private key, third-party authentication in a distributed network. ◎ KERBORES requirements are as follow: Secure Reliable Transparent Scalable It is implemented using an authentication protocol based on Needham – Schroeder.

Read More

FIVE NUMBER SUMMARY: EXAMPLE

WHAT IS FIVE NUMBER SUMMARY? The FIVE NUMBER SUMMARY consists of five values, from that five values it provides the information from the data set. FIVE NUMBER SUMMARY: EXAMPLE is an example. The Five Values in Five Number Summary: MEAN MEDIAN MAX Q1 Q2 I have explained all these Five Values in a previous article for FIVE

Read More