Protecting data through cryptography from unauthorized eyes is a high priority for organizations that store personal information. Cryptography is the process of hiding the real meaning of a message through a pre-determined code that is only known to the person encrypting and decrypting a message. Different forms of cryptography can be seen in our everyday life from the word puzzle in daily newspapers to secretaries writing in short hand. Cryptography has been around since the time of the Egyptians and has made many advances through the years.
The first sign of cryptography was documented on Egyptian scribes where non-standard hieroglyphs were used on clay tablets. (Whitman, 2011, p. 351) The Egyptians were the first documented people to use cryptography in 1900 B.C. (Whitman, 2011, p. 351) With cryptography surviving for so many years it is no wonder that it is still being used today to hide the real meaning of messages. There have been many advances since the time of the Egyptians but the purpose is still the same which is to keep information from unauthorized individuals.
With more personal data being stored on information systems that are accessible through the World Wide Web the desire for hackers to decode encrypted data has increased. Since there is additional interest in decoding encryption the cryptographers need to constantly develop harder cyphers for individuals to solve. Hackers steel personal information from personal computers or databases storing personal information for organizations than use the information to steel the identities of others. When personal information is sent over the internet through a network that is not using cryptography to encrypt the data it is very easy for the data to be view...
... middle of paper ...
...o keep un-authorized individuals from seeing the information they are sharing with others. Cryptography like technology is always going to be changing to try and keep one step in front of hackers. With so many organizations losing sensitive information to hackers it is important to continue to think outside of the box for new ways to secure data through cryptography.
Works Cited
Anthes, G. (2014). French Team Invents Faster Code-Breaking Algorithm. Communications Of The ACM, 57(1), 21-23. doi:10.1145/2555807
Mone, G. (2013). Future-Proof Encryption. Communications Of The ACM, 56(11), 12-14. doi:10.1145/2524713.2524718
Savage, N. (2013). Stopping the Leaks. Communications Of The ACM, 56(1), 19-21. doi:10.1145/2398356.2398363
Whitman, Michael E.; Mattord, Herbert J. (2011-01-01). Principles of Information Security
(Page 351). Cengage Learning. Kindle Edition.
Encryption is a strategy for changing data on a computer in a manner that it gets to be distinctly incomprehensible regardless of the possibility that somebody can access a PC with individual information on it.
This program uses mainly on the concept of cryptology. Cryptology is the study about secret communication between two parties, where there is a presence of a third party known as adversaries, and that party knows nothing about the content of the communication (Rivest, 1990).
Each day, billions of people worldwide depend on the security of digital systems. From medical history and test results at a hospital, to financial information and account statements at a bank, or social connections and personal messages on a smart phone, nearly every facet of a person’s life has some component of personal data associated with it that is stored on a computer. Furthermore, new forms of personal data to collect are being identified, gathered, analyzed, and stored all the time. This growth in the collection of personal data is so immense that the amount of digital data in existence approximately doubles every two years, and large companies are responsible for creating about 80% of this data increase (Gantz & Reinsel, 2011).
The RSA cryptosystem, imagined by Ron Rivest, Adi Shamir, and Len Adleman , was pitched in the August 1977 issue of Scientic American. The cryptosystem is generally ordinarily utilized for giving security and guaranteeing legitimacy of advanced information. Nowadays RSA is sent in numerous business frameworks. It is utilized by web servers and programs to secure web traffic, it is used to guarantee security and legitimacy of Email, it is utilized to secure remote login sessions, and it is at the heart of electronic Visa installment frameworks. In short, RSA is much of the time utilized within provisions where security of advanced information is a worry.
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
The RSA encryption is related to the cipher of Julius Caesar (1300s) that shifts three letters to encode messages. The cipher of Julius Caesar was used in war to send messages securely. Here is how Caesar encodes his message using the cipher. First Caesar assigned A through Z to 0 through 25. For instance A is zero. Second, add three to each numbers.
Today’s businesses and organizations need privacy. They need to keep their employee’s information, trade secrets, financial records, and many other sensitive documents that cannot be shown to the public. To do this, these organizations use encryption. Encryption is using an irreversible program to turn a file into gibberish. To translate the gibberish back to the original contents of the file, you must use a decryption program and provide a password. This is so the program can decrypt the file correctly. This encryption is what prevents cybercriminals who happen to get a hold of any files from looking at file contents. To the cybercriminal, encrypted files are completely useless unless he can figure out how it was encrypted. In order to decrypt the file, the cybercriminal must first find a series of steps that can decrypt the file over and over again: an algorithm.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
Cryptography is the study or science of techniques of secret writing and message hiding. Cryptography constitutes any method in which someone attempts to hide a message, or the meaning in some medium. One specific element of cryptography is encryption, which hides the data or information by transforming it into an undecipherable code. Encryption uses a specified key to perform the data transformation. The length of the key for the encryption
...tal part of lives just like privacy. Using cryptology provides mechanisms through a digital signature. This signature is inserted using a key (that only the writer of the email possesses) whilst a timestamp binds itself to the document. This type of cryptography is used to control access of security installations or pay-per-view television channels.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: