High level encryption or cryptography is used in a number of applications ranging from those which impact national security to those which are more mundane. Essentially, cryptography is the methodology of encoding information so that one’s privacy is ensured. This is particularly important when it comes to transactions which occur over the Internet. The risk of individuals gaining access to personal information or information which is critical to a country or a nation over the Internet is a very real one. The practice of cryptography lessens the likelihood of this happening.
Part A -- Identification and Description of the Issue
A greater and greater percentage of the world population is gaining access to the Internet and incorporating that access into their daily lives. More and more business transactions and personal transactions are occurring on the Internet. There is no questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential.
In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP and cryptography. While the TCP/IP protocol was an initial first attempt at data security and integrity, it is insufficient. TCP/IP was not really designed as a security provision and is insufficient to meet the criteria which are necessary to ensure safe transactions (Computer Reseller News PG).
Part B ---Understanding of Information Technology Background of Issue
Examples of the criteria which must be met to ensure the protection of information which is transmitted over the Internet include:
1. The authentication of users.
2. The economical provision of single-user login services.
3. The provision of one security scheme which works both from within the user’s firewall and from outside that firewall.
4. The protection of the privacy and integrity of both real-time and store-and-forward applications such as e-mail.
(Computer Reseller News PG).
Part C -- Analysis of Impact of Issue
The impacts of in...
... middle of paper ...
...uter Reseller News PG). This is accomplished by assigning each user both a private and a public key (Computer Reseller News PG). While the public key is published so that all can access it and use it to send information to its owner, the private key is kept secret and used by the receiver to decrypt the information which was sent (Computer Reseller News PG).
The utilization of cryptography is superior to dependence on TCP/IP in that while information can still be intercepted by unauthorized personnel, it is less likely to be decrypted due to the elaborate cryptographic scheme. Unlike cryptography, TCP/IP messages are commonly intercepted using sniffer packets. Once intercepted they are immediately apparent in their content and no decryption is involved.
Sources Cited
Anonymous. Introduction to Cryptology. http://www.cs.brown.edu/. 2002.
Computer Reseller News. Cryptography Is The Key To Intranet Security Needs, Computer Reseller News, 30 Jun 1999.
M2 Press Wire. Hewlett-Packard: HP to make electronic world safe for Internet business, M2 PressWIRE, 2 Mar 2000.
Menefee, Craig. US Encryption Policy Stagnating Says Pioneer Diffie, Newsbytes News Network, 10 Oct 2001.
The fundamental reason why security protocols are implemented in networks is simple – to protect data as it traverses the network. The mechanism associated with protecting data on its travels is called cryptography. This particular mechanism employs algorithms which encrypt data so that hackers are prevented from easily intercepting the data. Cryptography operates in tandem with a group of protocols which help to control the passing of data between network devices. Therefore, security protocols are a vital component in networks in order to increase data security and without them security would be compromised (Linn, 2014).
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
RSA encryption is the foundation of public key cryptography security products. For example, credit card companies use the RSA algorithm for customers’ individual online WebPages. The credit card companies publish a big number on WebPages, which is made by big prime numbers using the RSA algorithm. Since neither computers nor people can factor such big numbers, the RSA encryption system has secured many customers’ information.
Internet can give out a lot of advantages and new things to learn and experience, but it carries a risk of personal information leakage. Even a simple browsing history can show our most private interests. Hence, there are laws and legislation made to protect the confidential information. It acts as the barrier and protector against any unwanted outflow of information to computer criminals.
The idea of cryptography has been in existence since 1900 BC with the use of inscriptions on the tomb of Khnumhotep II, in Egypt (Red Hat). Ever since that time, the uses and methods have changed, but the overall idea of transferring information in a secret and efficient manner has been the driving force for faster and safer data transfer. This paper will define cryptography, discuss its long history, current trends and the future of the complex electronic security technology.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
In this research paper I want to shed light on encryption. After careful research it becomes clear that encryption has been around for centuries and used in various ways. There are two distinct methods of encryption: Public Key and Private Key. Each comes with its own set of pros and cons but Private Key is the more widely used method. Laws have been put into place to sanction the use of encryption products and devices. Information has been gathered from several different sources to also explain how encryption has impacted the past and how it will continue to shape our futures.
One of the largest parts of commerce is transaction. Transactions are needed anytime two parties exchange money or information. Since the Information Age has begun, transactions are more common over the Internet, where it is more imperative that transactions are secure (Klein x). Corporations have also become more widespread, which means that cryptography is needed to secu...
Privacy means that the control over data and security of one is the attempt to access the data by other unauthorized . These are two critical issues facing by both consumers and e-commerce sites alike. Since the invention of the World Wide Web , electronic commerce based on the Internet has grown from a simple idea into reality. Consumers browse through catalogs , finding the best deals, order goods and pay electronically . Information services can be subscribed online, and many newspapers and journals are still legible on the Internet . Most financial institutions have some sort of online presence, allowing customers to access and manage their accounts , financial transactions , commercial activities , etc. . E-mails exchanged within and between enterprises, and often replace copies and fax . He soon left may not discard any company that has an Internet presence, if only for reasons of publicity. In early 1998 more than 2 million Web servers were connected to the Internet, and more than 300 million host computers. And even if the actual internet business remains marginal: expectations are high
Modern encryption systems are obtained from one of two basic systems: symmetric key (sometimes called shared key) systems, and asymmetric key (often called public key) systems. An encryption process the sender and receiver share a single and common key that is used to encrypt and decrypt the message, then is called as symmetric key systems. Symmetric-key systems are simpler and faster, but their main drawback is th...
The usage of information systems within daily business and personal affairs for the transmission of confidential or even personal identifiable information, requires the usage of such as cryptography technology to secure the information. Three major forms of cryptography for digital transmission and data storage are hybrid, asymmetric, and symmetric cryptography algorithms, that provide security to protect the integrity, confidentiality, reliability, and authenticity of data transmissions and storage. (Rouse, 2008) However, each technology possesses individual traits and characteristics best suited for types of data transmission and storage. As symmetric key uses two identical keys for transmission and decryption, asymmetric employs a private
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
If a data is to be send to many people and if there is a separate key for an individual then it will be tedious work to generate those many number of keys and a difficult task to remember the key for each and every individual.
The Internet has revolutionized the computer and communications world like nothing before. The Internet enables communication and transmission of data between computers at different locations. The Internet is a computer application that connects tens of thousands of interconnected computer networks that include 1.7 million host computers around the world. The basis of connecting all these computers together is by the use of ordinary telephone wires. Users are then directly joined to other computer users at there own will for a small connection fee per month. The connection conveniently includes unlimited access to over a million web sites twenty-four hours a day, seven days a week. There are many reasons why the Internet is important these reasons include: The net adapts to damage and error, data travels at 2/3 the speed of light on copper and fiber, the internet provides the same functionality to everyone, the net is the fastest growing technology ever, the net promotes freedom of speech, the net is digital, and can correct errors. Connecting to the Internet cost the taxpayer little or nothing, since each node was independent, and had to handle its own financing and its own technical requirements.
The era of computers and technology has begun. Without computers in this day in age something’s would not even be possible. Although, technology has advanced our uses in society and race as a whole everyday life it also has created many issues. One of the biggest issues is system privacy. There are many things that threaten our safety online. For instance, have you ever sat down in your favorite café, or bookstore and surfed the web. Many of us have, but not all of us know the threat of something so innocent can be if your information gets in the wrong hands while out in public.