Cryptography is the study of secure or secret communications. Cryptography has been around for thousands of years. Cryptography has been around for thousands of years. Cryptography deals with authentication, confidentiality, and integrity of data. There are many different implementations of cryptography in information systems. This paper will cover hashing, encryption, digital signatures, and digital certificates.
Cryptography dates back as early as the Egyptian Hieroglyphs that were carved into the Pyramids and other Egyptian artifacts. They are necessary designed to be secret but do pose the intrigue of anyone who wants to read them. Unless you understand the glyphs you would not be able to understand the code. This is similar to cryptography today. Unless a person has a key to unlock the code, they are left with cipher text. Julius Caesar came up with one of the very first substitution ciphers. This was a simple shift cipher. The letters of the alphabet were shifted based on a predetermined number known only to those involved in the conversation. The Scytale was another early device used for cryptography. A leather strap was wound around a stick of a specific diameter. The message was then stamped into the leather. If the message was intercepted, the leather strap was useless without the stick with the specified diameter. Cryptography was used in both World Wars. The Germans had the Enigma machine which allowed the Germans to communicate securely with other German forces. This was very difficult to crack, but ultimately the code was broken. The United States and other Allies used several Native American tribes to use their native language to convey messages. The Navajo were very popular due to their languag...
... middle of paper ...
...thods discussed in this paper will ensure that the business has shown due diligence in its efforts to secure data.
Kahn Academy (2013, February 21). Diffie-Hellman Key Exchange (part 2) [Video file]. Retrieved from https://www.youtube.com/watch?v=dRUVG7YI1_k
Khan Academy (2013, February 21). Diffie-Hellman Key Exchange (part 1) [Video file]. Retrieved from https://www.youtube.com/watch?v=ko62sibi668
Kahn, D. (2008). The Navajo ¡°Windtalkers¡± by David Kahn. Retrieved April 11, 2014, from http://david-kahn.com/articles-navajo-windtalkers.htm
Kulkarni, S., Chole, V., & Prasad, P. S. (2014). Review on Authentication Mechanisms of Digital Signatures used for Certification. International Journal of Computer Science and Mobile Computing, 3(2), 735-738.
Whitman, M. E., & Mattord, H. J. (2011). Principles of Information Security. Boston: Course Technology.