answersLogoWhite

0

High efficiency

not complex

high secure

User Avatar

Wiki User

12y ago

What else can I help you with?

Continue Learning about Engineering

Which encryption algorithm is better and why?

If you're talking about symmetric key encryption (the kind where you just use one key for encryption and decryption), then arguably, the best encryption algorithm you can use is the Rijndael algorithm, better known now as AES (advanced encryption standard). It is the encryption standard used by the U.S. government for classified information. It is fast, requires little memory, and the only potential attacks against it are highly theoretical. Rijndael beat out Twofish and Serpent in the AES standard contest, but those other two algorithms will provide more than enough security as well. In the end, it doesn't really matter, since most successful attacks are made simply by finding out your key through brute force, espionage or extortion, rather than pure data analysis. Humans are almost always the weakest point when it comes to security, and it doesn't matter what algorithm you use if someone can guess your password.


Advantage of bzip2 compression algorithm over other algorithms?

Archives are smaller than with gzip. Compression requires more resources though.


What is the difference between programming and algorithm?

A program is a detailed set of instructions for a computer to carry out, whle an algorithm is a detailed sequence of steps for carrying out a process.


What is algorithm and what are its characteristics?

An "algorithm" is simply a method to solve a certain problem. For example, when you use the standard method you learned in school to write down two numbers, one beneath the other, then add them, you are using an algorithm - a method that is known to give correct results in this particular case.


What is sub-algorithm?

It is an algorithm used by another algorithm as part of the second algorithm's operation.As an example, an algorithm for finding the median value in a list of numbers might include sorting the numbers as a sub-algorithm: There are plenty of algorithms for sorting, and the specifics of the sorting does not matter to the "median value" algorithm, only that the numbers are sorted when the sub-algorithm is done.For what an algorithm is, see related link.

Related Questions

What is the significance of the keyword "ccp 673" in the context of data encryption algorithms?

In the context of data encryption algorithms, the keyword "ccp 673" signifies a specific parameter or value used in the encryption process. This keyword may refer to a key length, algorithm variant, or other important aspect of the encryption method being used. Understanding and properly implementing this keyword is crucial for ensuring the security and effectiveness of the encryption process.


Which encryption algorithm is better and why?

If you're talking about symmetric key encryption (the kind where you just use one key for encryption and decryption), then arguably, the best encryption algorithm you can use is the Rijndael algorithm, better known now as AES (advanced encryption standard). It is the encryption standard used by the U.S. government for classified information. It is fast, requires little memory, and the only potential attacks against it are highly theoretical. Rijndael beat out Twofish and Serpent in the AES standard contest, but those other two algorithms will provide more than enough security as well. In the end, it doesn't really matter, since most successful attacks are made simply by finding out your key through brute force, espionage or extortion, rather than pure data analysis. Humans are almost always the weakest point when it comes to security, and it doesn't matter what algorithm you use if someone can guess your password.


Improving security in real time wireless networks through packet scheduling?

In the present network we have not a security of your data so you can do develop a some algorithm,that is useful to protect the packets in dynamically,but now used algorithms can't protect the packets,so we can develop spss algorithm,this algorithm is more protect the packets compare to other algorithms.......


My friend made a bet with me that I couldn't break his custom encryption or something. I really have no idea what Im doing with this. Any help?

Whether one particular encryption algorithm can be broken with ease or only with a huge effort depends on the strength of the cipher. A simple encryption algorithm such as ROT-x or XOR-n are not very hard to break, however, present-day industry-standard encryption algorithms such as many forms of AES are very hard to break. Those simple algorithms are broken by application of logic and observation; one example are common picture puzzles where shapes are used to represent different digits, and combinations of shapes represent different mathematical equations. No encryption algorithm has been proven to be unbreakable, but some have been proven to be virtually impossible to break by brute force. Brute force attacks are done by trying out huge numbers of keys, for example. The impossibility to break a cipher in this manner is deducted from statistic probabilities about the number of attempts one would need to make in order to find the correct key. However, some particular algorithms have known weaknesses which can be exploited. For example, a weak algorithm might produce the same output from the same input every time, or produce different output with predictable differences. Many encryption schemes are also exploited by taking advantage of human weakness, such as trying out a list of well-known passwords, etc. Other methods of breaking an encryption scheme involve a known plaintext content: knowing the data, or part of the data, which ought to be within the encrypted data, can allow for conclusions about the encryption algorithm. In WWII, the German Enigma encryption engine was famously broken based on such knowledge. Therefore, an important step about an encryption code is to collect as much information about the code, its application, and its inventor, as possible. These will often give clues about the nature of the algorithm, or about particular limitations, which would then lead to planning the next steps.


Advantage of bzip2 compression algorithm over other algorithms?

Archives are smaller than with gzip. Compression requires more resources though.


What is a deterministic algorithm and how does it differ from non-deterministic algorithms?

A deterministic algorithm is a step-by-step procedure that always produces the same output for a given input. It follows a predictable sequence of steps to solve a problem. On the other hand, a non-deterministic algorithm may produce different outputs for the same input due to randomness or non-deterministic choices made during its execution. This makes non-deterministic algorithms harder to predict and analyze compared to deterministic algorithms.


How can one demonstrate the effectiveness of an algorithm?

One can demonstrate the effectiveness of an algorithm by analyzing its performance in terms of speed, accuracy, and efficiency compared to other algorithms or benchmarks. This can be done through testing the algorithm on various datasets and measuring its outcomes to determine its effectiveness in solving a specific problem.


What is the efficiency of the median finding algorithm using divide and conquer in comparison to other algorithms for finding the median?

The efficiency of the median finding algorithm using divide and conquer is generally better than other algorithms for finding the median. This is because the divide and conquer approach helps reduce the number of comparisons needed to find the median, making it more efficient in most cases.


What is the significance of the big O notation in the context of algorithm efficiency, particularly in relation to the outer loop of a program?

The big O notation is important in analyzing the efficiency of algorithms. It helps us understand how the runtime of an algorithm grows as the input size increases. In the context of the outer loop of a program, the big O notation tells us how the algorithm's performance is affected by the number of times the loop runs. This helps in determining the overall efficiency of the algorithm and comparing it with other algorithms.


Suppose acomputer memory were infinitely fast and computer memory were free would you have any reasion to study algorithm yeas or no why?

If there was some magical infinitely fast infinite memory computer then a brute force algorithm would have the same running time as an elegant algorithm, so in that case it wouldn't make any difference. However, there is no such thing as an infinitely fast computer or free memory, in the real world you have to make trade-offs and know how those affect your memory-usage and running-time. Also, unless you know algorithms you are going to have a VERY hard time trying to code any sort of advanced functionality, especially things like encryption which depend on strong randomness, and where a small mistake anywhere in your algorithm can mean that your encryption can be easily compromised by someone who knows what they are doing.


How can one determine the lower bound for a given problem or algorithm?

To determine the lower bound for a problem or algorithm, one can analyze the best possible performance that any algorithm can achieve for that problem. This involves considering the inherent complexity and constraints of the problem to establish a baseline for comparison with other algorithms.


Algorithms are presented visually by using flow charts?

Yes. At least, that is one way of presenting an algorithm. Other ways include a verbal description, and pseudocode.