Skip to main content

Featured post

PL/SQL: Popular Reserved Words

Perfect in PL/SQL is an art. To become this you need to understand top reserved words and their meanings. The below list is useful for your projects.


Top List of PL/SQL Reserved Words.. Before you start knowing reserved words, wait one moment. The reserved words all are similar to words that you use in normal SQL. ALL*DESC*ISOLATIONOUTSQLERRMALTER*DISTINCT*JAVAPACKAGESTART*AND*DOLEVEL*PARTITIONSTDDEVANY*DROP*LIKE*PCTFREE*SUBTYPEARRAYELSE*LIMITEDPLS_INTEGERSUCCESSFUL*AS*ELSIFLOCK*POSITIVESUMASC*ENDLONG*POSITIVENSYNONYM*AUTHIDEXCEPTIONLOOPPRAGMASYSDATE*AVGEXCLUSIVE*MAXPRIOR*TABLE*BEGINEXECUTEMINPRIVATETHEN*BETWEEN*EXISTS*MINUS*PROCEDURETIMEBINARY_INTEGEREXITMINUTEPUBLIC*TIMESTAMPINTEGEREXTENDSMLSLABEL*RAISE

8 Popular Encryption methods real Usage

Encryption works as it replaces original data with some special characters and stores the data. You need a private key to decrypt the data. Else it is not possible to understand encrypted data even for hackers.

Private keys are two types. Sender uses one private key and receiver uses one other private key.

I have given in this post about 8 encryption methods.

Flow Diagram Encryption


encryption
image courtesy by digit.in

 Different Encryption Methods

  1. Classic Cipher
  2. Random Key Generation
  3. RSA Token
  4. Hash Functions
  5. Mac value - Message Authentication code
  6. Key Hash
  7. TLS Protocol
  8. Authenticated Cipher

 1. Classic Cipher

The best example is this kind of algorithm was used in world war -II communication machines.

2. Random Key Generations

One kind of security. They use an algorithm that sends random numbers. People use that number as a password.

3. RSA Token

Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password.

4. Hash Functions

It assigns a hash value for each input data value. So that third person cannot map to original data. The hash value is either 256 or 512 bits.

5. MAC Value

It is also called message authentication value. It takes 3 types of input.

6. Key Hash

Key hash is little different than Hash Function. In the case of Hash function, the reverse calculation of 256 or 512 bits give a clue to original data. So possibility of hacking you can find in Hash functions.

So Key Hash came into picture. The data first go through a MAC algorithm, where it creates Tag called MAC tag. So in Key Hash process one additional data transmitted that is called MAC Tag.

One more mechanism is Pseudorandom Functions also called PRFs. Where it calculates random key.

7. TLS Protocol

TLS is a transport layer security protocol(TLS). It works basically as a internet security layer. This works as middle layer between Server and Website.

8. Authenticated Cipher

In this case, both encryption, MAC tag help to check the authenticity of data or transactions.

Related Posts

Comments

Popular posts from this blog

Blue Prism complete tutorials download now

Blue prism is an automation tool useful to execute repetitive tasks without human effort. To learn this tool you need the right material. Provided below quick reference materials to understand detailed elements, architecture and creating new bots. Useful if you are a new learner and trying to enter into automation career.
The number one and most popular tool in automation is a Blue prism. In this post, I have given references for popular materials and resources so that you can use for your interviews.
RPA Blue Prism RPA blue prism tutorial popular resources I have given in this post. You can download quickly. Learning Blue Prism is a really good option if you are a learner of Robotic process automation.

RPA Advantages The RPA is also called "Robotic Process Automation"- Real advantages are you can automate any business process and you can complete the customer requests in less time.

The Books Available on Blue Prism 
Blue Prism resourcesDavid chappal PDF bookBlue Prism Blogs

Hyperledger Fabric Real Interview Questions Read Today

I am practicing Hyperledger. This is one of the top listed blockchains. This architecture follows R3 Corda specifications. Sharing the interview questions with you that I have prepared for my interview.

Though Ethereum leads in the real-time applications. The latest Hyperledger version is now ready for production applications. It has now become stable for production applications.
The Hyperledger now backed by IBM. But, it is still an open source. These interview questions help you to read quickly. The below set of interview questions help you like a tutorial on Hyperledger fabric. Hyperledger Fabric Interview Questions1). What are Nodes?
In Hyperledger the communication entities are called Nodes.

2). What are the three different types of Nodes?
- Client Node
- Peer Node
- Order Node
The Client node initiates transactions. The peer node commits the transaction. The order node guarantees the delivery.

3). What is Channel?
A channel in Hyperledger is the subnet of the main blockchain. You c…

SQL queries how to use built-in functions correctly

In this post I am giving top examples on SQL functions. About built-in functions, I have covered in my previous post.
List of examples:DATE-TIME functionsNumeric functionsChar functionsNull-related functions1. DATE/TIME functions SELECT p_code, launch_dt, CURRENT_DATE FROM product; CURRENT_DATE returns current date.
SELECT p_code, TO_CHAR(launch_dt, 'DD MONTH YYYY') reformatted_dt FROM product; TO_CHAR function returns DATE in CHAR format.
2. Numeric functions SELECT p_code, price, (price - 20), ABS(price - 20.00) FROM product; ABS - function returns absolute value
SELECT p_code, price, ROUND (price, 1) FROM product;
ROUND function - Round to 1 digit.
SELECT p_code, price, SIGN(price - 15) FROM product;
SIGN function - It returns sign; either + or -
SELECT p_code, price, TRUNC(price, 1) FROM product;
TRUNC function - Truncates to a certain number of decimal places.
3. CHAR functions SELECT p_code, CONCAT(CONCAT(p_name, ' -- ') , price) FROM product; CONCAT function - co…

SQL built-in functions useful to read quickly

You can find there are four different types of functions in SQL. All these are built-in functions. You no need to create these functions, and these come with your SQL.

I am discussing today about SQL functions List.
SQL functionsDATE-TIME functionsNumeric functionsChar functionsNull-related functions 1. DATE-TIME functions These functions useful to get DATE and Time. Also you can covert DATE and TIME to Char. These are TO_CHAR, CURRENT_DATE and CURRENT_TIME 2. Numeric Functions These functions you can use for numeric calculations. Those are TRUNC, SIGN, ROUND, ABS 3. Char Functions To handle string related tasks you can use CHAR functions. The CHAR functions are like SUBSTR, CONCAT, LENGTH. 4. NULL related functions To handle null values you can use different functions. Those are COALESCE, NVL, NULLIF

This post covered all your answers for SQL functions list, SQL built-in functions in Oracle, and SQL functions in any DBMS.
Also Read SQL tips to improve Query performanceSummary
I have e…

PL/SQL: Popular Reserved Words

Perfect in PL/SQL is an art. To become this you need to understand top reserved words and their meanings. The below list is useful for your projects.


Top List of PL/SQL Reserved Words.. Before you start knowing reserved words, wait one moment. The reserved words all are similar to words that you use in normal SQL. ALL*DESC*ISOLATIONOUTSQLERRMALTER*DISTINCT*JAVAPACKAGESTART*AND*DOLEVEL*PARTITIONSTDDEVANY*DROP*LIKE*PCTFREE*SUBTYPEARRAYELSE*LIMITEDPLS_INTEGERSUCCESSFUL*AS*ELSIFLOCK*POSITIVESUMASC*ENDLONG*POSITIVENSYNONYM*AUTHIDEXCEPTIONLOOPPRAGMASYSDATE*AVGEXCLUSIVE*MAXPRIOR*TABLE*BEGINEXECUTEMINPRIVATETHEN*BETWEEN*EXISTS*MINUS*PROCEDURETIMEBINARY_INTEGEREXITMINUTEPUBLIC*TIMESTAMPINTEGEREXTENDSMLSLABEL*RAISE

Ubuntu VI editor Commands to learn today

I have given VI editor commands to use in Ubuntu operating system. You can practice using them for your benefit and you can complete your work quickly.

To begin changing or adding to text with vi, you can enter Insert or Replace modes, as shown in the following list. When you enter Insert or Replace mode, the characters you type will appear in the text document (as opposed to being interpreted as commands).
Ubuntu Vi editor commands Press the Esc key to exit to Normal mode after you are done inserting or replacing text.
List of VI Editor Commands.. i—Typed text appears before current character.

a—Typed text appears after current character.

o—Open a new line below current line to begin typing.

s—Erase current character and replace with new text.

c?—Replace ? with l, w, $, or c to change the current letter, word, end of line, or line.

r—Replace current character with the next one you type.

Shift+i—Typed text appears at the beginning of current line.

Shift+a—Typed text appears at the end…

Automation developer these are top Skills you need to learn

Robotic process automation is an upcoming IT skill. Three tools are popular. It is difficult to learn all three tool. So, learn anyone tool to start your career in automation.
To get a job in this line, I found in my research that some programming skills and Hand-on training on any one of the tools is required. Also, try to know the differences between popular RPA tools.
Skills Companies Looking in Automation Engineers All big companies looking for candidates having experience in Automation anywhere, Blue Prism and UIPath. It is not possible to learn all tools. Learn anyone tool and do practice well.

Ok.

You may ask a question about how to do it. Join in good training institute and learn one tool.  Take online classes to learn faster.

To learn Uipath try here. Also, you can enroll online course to learn UiPath.

UiPath GO The list of IT skills you needAutomation anywhere/Blue Prism/Uipath .Net/C#/Java/SQL skills MS-Visio Power Builder Python scripts/Unix Scripts/Perl Scripts HTML/CSS/J…

Three popular RPA tools functional differences

Robotic process automation is growing area and many IT developers across the board started up-skill in this popular area. I have written this post for the benefit of Software developers who are interested in RPA also called Robotic Process Automation.


In my previous post, I have described that total 12 tools are available in the market. Out of those 3 tools are most popular. Those are Automation anywhere, BluePrism and Uipath. Many programmers asked what are the differences between these tools. I have given differences of all these three RPA tools.

BluePrism Blue Prism has taken a simple concept, replicating user activity on the desktop, and made it enterprise strength. The technology is scalable, secure, resilient, and flexible and is supported by a comprehensive methodology, operational framework and provided as packaged software.The technology is developed and deployed within a “corridor of IT governance” and has sophisticated error handling and process modelling capabilities to ens…