preview

The History and Applications of Cryptography

explanatory Essay
1296 words
1296 words
bookmark

Cryptography is the study of secure or secret communications. Cryptography has been around for thousands of years. Cryptography has been around for thousands of years. Cryptography deals with authentication, confidentiality, and integrity of data. There are many different implementations of cryptography in information systems. This paper will cover hashing, encryption, digital signatures, and digital certificates.

Cryptography dates back as early as the Egyptian Hieroglyphs that were carved into the Pyramids and other Egyptian artifacts. They are necessary designed to be secret but do pose the intrigue of anyone who wants to read them. Unless you understand the glyphs you would not be able to understand the code. This is similar to cryptography today. Unless a person has a key to unlock the code, they are left with cipher text. Julius Caesar came up with one of the very first substitution ciphers. This was a simple shift cipher. The letters of the alphabet were shifted based on a predetermined number known only to those involved in the conversation. The Scytale was another early device used for cryptography. A leather strap was wound around a stick of a specific diameter. The message was then stamped into the leather. If the message was intercepted, the leather strap was useless without the stick with the specified diameter. Cryptography was used in both World Wars. The Germans had the Enigma machine which allowed the Germans to communicate securely with other German forces. This was very difficult to crack, but ultimately the code was broken. The United States and other Allies used several Native American tribes to use their native language to convey messages. The Navajo were very popular due to their languag...

... middle of paper ...

...thods discussed in this paper will ensure that the business has shown due diligence in its efforts to secure data.

Works Cited

Kahn Academy (2013, February 21). Diffie-Hellman Key Exchange (part 2) [Video file]. Retrieved from https://www.youtube.com/watch?v=dRUVG7YI1_k
Khan Academy (2013, February 21). Diffie-Hellman Key Exchange (part 1) [Video file]. Retrieved from https://www.youtube.com/watch?v=ko62sibi668
Kahn, D. (2008). The Navajo ¡°Windtalkers¡± by David Kahn. Retrieved April 11, 2014, from http://david-kahn.com/articles-navajo-windtalkers.htm
Kulkarni, S., Chole, V., & Prasad, P. S. (2014). Review on Authentication Mechanisms of Digital Signatures used for Certification. International Journal of Computer Science and Mobile Computing, 3(2), 735-738.
Whitman, M. E., & Mattord, H. J. (2011). Principles of Information Security. Boston: Course Technology.

In this essay, the author

  • Explains that cryptography is the study of secure or secret communications. it deals with authentication, confidentiality, and integrity of data.
  • Explains that cryptography dates back to the egyptian hieroglyphs that were carved into the pyramids and other egyptian artifacts.
  • Explains that hashing is a one-way mathematical function that is relatively easy to compute, but significantly harder to reverse.
  • Explains that encryption is different from hashing and can be reversed or decrypted using a key.
  • Describes the diffie-hellman key exchange, which allows two communicating parties to establish a secret key without having any prior knowledge of each other.
  • Explains how digital signatures are used to authenticate a source digitally. they combine hashing and private keys to ensure authenticity.
  • Explains the basic uses of cryptography. confidentiality, integrity, and authentication are increasingly important in today's world. using a combination of the methods discussed in this paper will ensure that the business has shown due diligence.
  • Describes kahn academy's diffie-hellman key exchange (part 2) and the navajo windtalkers.
Get Access