Cryptography
Part one---Why do we need to learn cryptography
Now is a time which the information is extremely development. A lot of datas are stored by the form of electronic messages. The transmission of the information is often through electronic medium such as mobile phone communication, electronic commerce, the on-line chat service etc. Unfortunately, those way of transmit the information are not safe. The message that we delivered is possible be stolen or monitored. If we have no appropriate protect measure, so once the important messages leaks out, the result may be inconceivable.
The safe protection system of any rank all may introduce the concept of encryption. The data encryption has the very vital significance to the network correspondence and the data storage, it can play an important role of keep the data security, authenticate message, maintain the integrity of data and anti- denial.
That's why we should learn cryptography.
Part two---The summarize of data encryption
Cryptology is the technical basic of resolves the network security questions, is a special research area. An encrypt technology mainly includes following aspects:
・Encryption. It is the process that transforms the original message or data to a scrambled message.
・Decipher. It is the opposite process of Encryption, it's the process that transforms the scrambled message to original message or data.
・Authentication. The process how to distinguish individual, the machine of network or the organization.
・Digital Signatures. It bundle the specific key and the message which will transmit. Then transmit the scrambled message with the specific key which is uses for decipher. And the key itself is encrypted...
... middle of paper ...
...ypted the message first in order to prevent other person's interception. When the right person received the message, he will decrypt it to obtain original message. Through this study, I also understand some basic encipher and decipher algorithms .I have understood the basic thought of these encrypt and decrypt algorithms. And this is the first time I use English to complete a dissertation. This has improved my English. This study has trained my abilities. Such as how to look over the relevant books, how to uses network to search related information.
References:
Security of computer network. Deng Yaping, Posts &Telecom press, 2004
Network Security Essentials: Applications and Standards. Qinghua University press, 2002.
Cryptograph and Network Security : Principles and Practice Second Edition. Qinghua University press. 2002.
The information of web.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data. The length of Asymmetric Key Encryption is normally 1024 or 2048 bits. However, in Asymmetric framework the keys with smaller than 2048bits are considered as not safe to use.
Over the last twenty years the progress in the technologies which handle information have appeared very dramatic and has therefore posed a threat to information privacy. Analysis of this progress reveals that this progress is not in terms of new technologies being invented but those technologies already known have increased dramatically in their power while also falling dramatically in their prices. This has happened to such a degree that the market penetration could only have been dreamed about by the most optimistic of market analysts a decade ago. The countries that are predominately concerned are those of the developed first world but as a result of the tremendous market penetration of these products their prices have now fallen to such a level that it cannot be long before the technology spreads progressively through the developed world also.
Electronic progress has been miraculous, even exciting, but with it problems evolve. One of the greatest is the threat to people's personal privacy. The Automatic Teller Machine (ATM) was developed in the 1980's to give people an easier way to de posit and withdraw cash that they had in the bank. Everyone who has an account is assigned a secret PIN number, but someone in the bank has access to clients' financial records in the electronic database. Another type of new technology is the ele ctronic tolls used on the nation's highways. Drivers can pay tolls...
There are many terms which have been introduced by the field of encryption. Each of these terms are need to understand this discussion. Plaintext is the original document to be transmitted or stored on a computer system. Ciphertext is the encrypted document. ...
Encryption: - Data encryption is the best way to reduce risks associated with misplaced, lost or stolen data.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
In this research paper I want to shed light on encryption. After careful research it becomes clear that encryption has been around for centuries and used in various ways. There are two distinct methods of encryption: Public Key and Private Key. Each comes with its own set of pros and cons but Private Key is the more widely used method. Laws have been put into place to sanction the use of encryption products and devices. Information has been gathered from several different sources to also explain how encryption has impacted the past and how it will continue to shape our futures.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
Nowadays, the information is the most treasured asset in an organization, due to it along with the experience represents the input necessary to take appropriate decisions and consequently to have success in the business. Almost all the information and knowledge related with the processes business, goods and services offered by a company, is processed, managed and stored through technology and information systems, thus the security of information has become increasingly important and plays a critical role in the enterprise government.
Compression means the decrease in size of information with a specific end goal to save storage space or transmission time over the network. For information transmission, compression can be performed on simply the information content or on the whole transmission unit depending upon various elements. Content compression can be as simple as removing all extra space characters, embedding a single reused character to show a string of reused characters, and substituting tinier bit strings for as often as possible occurring characters. This sort of compression can lessen a content record to half of its unique size. Compression is performed by a program that uses a formula or calculation to decide how to compress or decompress
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: