Home Start Back Next End
  
18
2.13 Encryption and Decryption Algorithm
According
to
Mitchell
Bradley[26]
Encryption  
is
a  
process
of
coding
in
sequence
which
could
either
be
a
file
or  
mail
message  
in
into
cipher
text   a
form
unreadable
without a decoding key in order to avoid anyone except the intended recipient from
reading
that
data.
Decryption
is
the
reverse
process
of
convert  encoded
data
to
its
original un-encoded form, plaintext. A key in cryptography is a long sequence of bits
used
by
encryption
/
decryption
algorithms.
For
example,
the
following
represents a
hypothetical 40-bit key: 00001010 01101001 10011110 00011100 01010101A given
encryption  algorithm  take  the  original  message,  and  a  key,  and  alters  the  original
message
mathematically
base
on
the
key's bits
to
make
a
new
encrypted
message.
Likewise, decryption algorithms take an encrypted message and restore it to its original
form using one or more keys.
2.14 Session Hijacking
Session
hijacking refers
to the exploitation of a
valid computer session—sometimes also
called
a
session
key—to
gain
unauthorized
access
to
information
or
services
in a
computer system.
In particular,
it
is
used to
refer to the theft of a
magic cookie
used
to
authenticate a
user to a
remote server. It
has particular relevance
to
web developers,
as
the HTTP cookies
used to
maintain a session on
many web sites can be easily stolen by
Word to PDF Converter | Word to HTML Converter