Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cryptography's history
Cryptography's history
Cryptography's history
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cryptography's history
I. What is Cryptography
Cryptography is a secrecy technique where the users involved create an actual message but it is hidden in some way. One form of Cryptography is Steganography. This is another secrecy technique, a bit more ancient than cryptography itself. It has been used for thousands of years, but as a primitive form of secret messages. The word itself is a derivative of two Greek words: steganos means “covered” and graphein means to “write”. In ancient time, a man named Pliny the Elder used milk from a thitymallus plant as invisible ink. In Greece and in Persia they would shave a messenger’s head, write a message on his bald scalp, then wait for the hair to grow over it before sending him out to deliver the message. Sometimes they would go as far as to tattoo the message on his head. Obviously the message could not be extremely urgent. The technique of Steganography is not used much for security these days because it has become obscure. It does have strengths and weaknesses, one major weakness being that if the message is found, the secret is out.
Cryptography is another method used to hide the meaning of a message. Cryptography is also derived from the Greek, specifically from the work kryptos, which means “hidden”. Cryptography techniques are different from steganograhic techniques in that this technique is not hiding the actual message, only the meaning of the message. If the message would end up in the wrong hands, the use of cryptography would make sure that the message could not be read, whereas steganography would not, the message would be read. Usually a sender and a receiver would agree as to what kind of scrambling protocol they would use prior to attempting to send any message. They would also agree h...
... middle of paper ...
... Key and Private Keys." Public Keys and Private Keys. N.p., n.d. Web. 18 Mar. 2014.
"History of Cryptography." Wikipedia. Wikimedia Foundation, 15 Mar. 2014. Web. 18 Mar. 2014.
"Public-key Encryption for Dummies." Public-key Encryption for Dummies. N.p., n.d. Web. 18 Mar. 2014.
"A Brief History of Cryptography." RSS. N.p., n.d. Web. 17 Mar. 2014.
"A Brief History of Cryptography." Thawte Crypto Challenge – Can You Be the First to Crack the Code in Our Cipher Challenge? N.p., n.d. Web. 17 Mar. 2014.
"NSRP: Cryptography." NSRP: Cryptography. N.p., n.d. Web. 18 Mar. 2014.
"Cryptography Defined/Brief History." Cryptography Defined/Brief History. N.p., n.d. Web. 18 Mar. 2014.
"Private Key (secret Key)." What Is ? N.p., n.d. Web. 18 Mar. 2014.
"Public and Private Key Encryption Systems." Public and Private Key Encryption Systems. N.p., n.d. Web. 18 Mar. 2014.
1. Hashing Hashing makes a one of a kind, settled length signature for a message or informational index. Each "hash" is exceptional to a particular message, so minor changes to that message would be anything but difficult to track. When information is scrambled utilizing hashing, it can't be turned around or deciphered. Hashing, then, however not in fact an encryption technique all things considered, is still helpful for demonstrating information
"The Good, The Bad And The Ugly Of Bitcoin Security." Hongkiatcom RSS. N.p., n.d. Web. 22 Apr. 2014.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
RSA encryption is the foundation of public key cryptography security products. For example, credit card companies use the RSA algorithm for customers’ individual online WebPages. The credit card companies publish a big number on WebPages, which is made by big prime numbers using the RSA algorithm. Since neither computers nor people can factor such big numbers, the RSA encryption system has secured many customers’ information.
Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption
“The Economist Explains, How Does Bitcoin Work?” The Economist (2013): n. pag. Web. 08 Apr. 2014.
At the first thought of steganography what is the first thing that pops into you mind? For me I would have to stay the court steganography. It is really the only way I heard steganography mention before, but after research I came to the realization that court steganography is just one part of the various types of steganography that there are. Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication to hide a message from a third party (Gary). Going all the way back to the caveman error steganography exited. There form of usage were painting on the wall that they used to communicate with each other. Some were simpler than others to understand others are still being coded as I write on this
My knowledge has grown over the past six years, outwith the areas of learning offered by school courses, and I see this course as an opportunity to gain new skills and broaden my knowledge further. My main interests are varied, including communications and the internet, system analysis and design, software development, processors and low level machine studies. I have recently developed an interest in data encryption, hence my active participation in the RSA RC64 Secret-Key challenge, the latest international de-encryption contest from the RSA laboratories of America.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
...tal part of lives just like privacy. Using cryptology provides mechanisms through a digital signature. This signature is inserted using a key (that only the writer of the email possesses) whilst a timestamp binds itself to the document. This type of cryptography is used to control access of security installations or pay-per-view television channels.
Image steganography is about hiding the message inside a message without any visible modifications to the real world. Digital image is the most common type of carrier used for steganography. A digital image is composed of finite number of elements each of which has a particular location and value (gray scale). The processing of these digital images by means of a digital Computer is referred as digital image processing. Images are used for steganography in following ways. The message in encrypted form or in the original form is embedded as the secret message to be sent into a graphic file. This results in the production of what is called a stego-image. Additional secret data may be needed in the hiding process e.g. a stegokey. The stego-imag...
“In the early years of World War II,” (Sales), the airways in Poland were flooded with coded messages that created confusion with the “cryptanalyst working in the cipher bureau” (Maziakowski). Over a several years over Poland received thousands of messages but still hadn’t any luck.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Makeitsecure.org. 2014. Top Tips - Make IT Secure. [online] Available at: http://www.makeitsecure.org/en/top-tips.html [Accessed: 13 Mar 2014].
Symantec 2013, Secure Sockets Layer (SSL): How It Works, Symantec, viewed 15 May 2013, .