Cryptography is the science of writing in secret code and is an ancient art. Cryptography has a long and fascinating history. Its use has been traced back to as early as 4000 years ago. Cryptography was used as a tool to protect national secrets and strategies. To understand the subject of cryptography, its history must also be explored. Cryptography exists in many different forms. There are many cryptographic algorithms. There are a numerous amounts of different types of cryptography. All these different types of cryptography have reasonable uses in the world. One key area where cryptography is used is in network security.
HISTORY & TYPES OF CRYPTOGRAPHY
The history of cryptography is outstanding. Cryptography has been dated back to 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Cryptography is the art of protecting information by transforming the data into an unreadable format. This is known as cipher text. The encrypted data can now only be deciphered, or decrypted by those who possess the secret key. A summary of this is that cryptography allows information to be transformed into a manner which the access to it can be limited by choice. Cryptography exists in many deferent forms. Various different kinds of cryptographic algorithms exist. There are several ways of classifying cryptographic algorithms.
SECRET KEY CRYPTOGRAPHY (SKC) – Uses a single key for both encryption and decryption
Secret Key Cryptography utilizes a single key for both encryption and decryption. The sender of the information uses the key to encrypt the plaintext and then sends the cipher text to the receiver of the information. The receiver must also have the same key to be able to apply it to...
... middle of paper ...
...ns of providing information security, but rather one set of techniques. The various types and methods of cryptographic algorithms are endless. The use of cryptography is spread out throughout our world, and has been used for several years. The use of cryptography will only expand as the use of technology and technological innovations increase.
Works Cited
"Cryptography." Government of Canada, Industry Canada, National Capital Region, Office of the Deputy Minister, Spectrum, Information Technologies and Telecommunications, Electronic Commerce Branch. N.p., n.d. Web. 16 Jan. 2014.
"An Overview of Cryptography." An Overview of Cryptography. N.p., n.d. Web. 16 Jan. 2014.
"Quantum Key Distribution." Quantum Key Distribution. N.p., n.d. Web. 16 Jan. 2014.
"What Types of Cryptography Are There?" What Types of Cryptography Are There? N.p., n.d. Web. 16 Jan. 2014.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
PKC is the enabling technology for all Internet security and the increasing use of digital signatures, which are replacing traditional signatures in many contexts. However, RSA is better than PKC because RSA doesn’t need digital signature. As a result, the RSA algorithm turned out to be a perfect fit for the implementation of a practical public security system. In 1977, Martin Gardner first introduced the RSA system. After 5 years, company RSA used secure electronic security products. Nowadays many credit companies of all over the world use the RSA system or a similar system based on the RSA system.
Sabu M. Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez (Eds.), Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings (Communications in Computer and Information Science) (p. 418). New York, NY: Springer Publishing.
..., Nicholas G. 2010. “Past, Present, and Future Methods of Cryptography and Data Encryption.” Department of Electrical and Computer Engineering
In July 2015, many of the world’s high ranking cryptographers published that the loss and destruction induced by adopting a key escrow system 20 years ago would be even more serious, that would be very hard to identify security weaknesses that could be misused by
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
What are the types of intrauterine devices (IUDs)? - IUD Birth Control: Facts about the Risks and Benefits. (n.d.). Retrieved from http://www.medicinenet.com/iud/page2.htm
Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
Data Encryption is from the cryptography science, which includes coding and decoding of message to protect the safety. Development computer technology makes the encryption even more complicated. The ability for people to break codes is increasing, so are the ability to guard the codes. Many encryptions are available now. They were developed by some hi-tech company and sold, or you can choose some free service. Actually, when you are using the web browsers, emails, or even the basic system, your information has been automatically encrypted.
My knowledge has grown over the past six years, outwith the areas of learning offered by school courses, and I see this course as an opportunity to gain new skills and broaden my knowledge further. My main interests are varied, including communications and the internet, system analysis and design, software development, processors and low level machine studies. I have recently developed an interest in data encryption, hence my active participation in the RSA RC64 Secret-Key challenge, the latest international de-encryption contest from the RSA laboratories of America.
...tal part of lives just like privacy. Using cryptology provides mechanisms through a digital signature. This signature is inserted using a key (that only the writer of the email possesses) whilst a timestamp binds itself to the document. This type of cryptography is used to control access of security installations or pay-per-view television channels.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
windows.microsoft.com. 2014. What is encryption? - Microsoft Windows Help. [online] Available at: http://windows.microsoft.com/en-ie/windows/what-is-encryption#1TC=windows-7 [Accessed: 18 Mar2014].