Cryptography: the Past, Present and Future
The idea of cryptography has been in existence since 1900 BC with the use of inscriptions on the tomb of Khnumhotep II, in Egypt (Red Hat). Ever since that time, the uses and methods have changed, but the overall idea of transferring information in a secret and efficient manner has been the driving force for faster and safer data transfer. This paper will define cryptography, discuss its long history, current trends and the future of the complex electronic security technology.
CRYPTOGRAPHY DEFINED To begin, the idea of cryptography should be defined. ”Cryptography is a cornerstone of the modern electronic security technologies used today to protect valuable information resources on intranets, extranets,
That example does not compare to today’s cryptography, but the idea of creating a code for communication purposes ties the two together. Over the years, other forms of hidden message transmission has occurred, mostly for use in military actions. Around 100 BC, Julius Caesar used a form of encryption, a substitution cipher called the Caesar cipher, to give secret messages to his army generals. To explain further, “a cipher is an algorithm used for encryption or decryption” (Red Hat). So, in the substitution cipher, each character of text you see is represented as a different character according to the cipher
This is due to the increasing speed and complexity of technology, which includes the tech-savvy individuals. Some emerging trends for cryptology according to Amy Webb’s article in the Harvard Business Review include blockchain, which is a form of “distributed consensus system, where no one person controls all the data” (Webb). Currently, it had been used in conjunction with bitcoin technology, but there is an emerging prototype called “sidechain” (Webb), which carries its own code and will allow for easier authentication. This will open the door for a more widespread use of the platform and change the data protection
In July 2015, many of the world’s high ranking cryptographers published that the loss and destruction induced by adopting a key escrow system 20 years ago would be even more serious, that would be very hard to identify security weaknesses that could be misused by
Today’s encryption methods employ the factoring of extremely large numbers. Nevertheless, several quantum algorithms already exist that can factor large numbers almost instantaneously. Although quantum computing is still in its infancy, numerous national defense experts have argued that innovative systems of encryption will become increasingly critical as quantum computing progresses. In an effort to augment the future of national security, I aspire to develop groundbreaking encryption techniques that will defend against many impending
Transmitting codes has been around for nearly two centuries, First using a code called Morse code when they needed to transmit vital messages from Washington D.C up to Baltimore within short periods of time. They would transmit these messages from a device called the telegraph during the Civil War period. The reason why it’s called Morse CODE is because only a few people in the whole world knew how to translate the message from a few dots and dashes to whole sentences and send a message back. The reason for this is because morse came up with a unique form of his own language using a designated code of dots and dashes.
PKC is the enabling technology for all Internet security and the increasing use of digital signatures, which are replacing traditional signatures in many contexts. However, RSA is better than PKC because RSA doesn’t need digital signature. As a result, the RSA algorithm turned out to be a perfect fit for the implementation of a practical public security system. In 1977, Martin Gardner first introduced the RSA system. After 5 years, company RSA used secure electronic security products. Nowadays many credit companies of all over the world use the RSA system or a similar system based on the RSA system.
Another way messages are often coded is through a cipher code. In a cipher code a number stands for a particular letter. The one used in this show is pretty simple; the number one stands for “A,” two stands for “B,” three for “C” and so on. This is the type of code that was shown after the credits most often in season two. This code is likely how the main villain Bill Cipher got his name. Bill is probably the one behind the
Data Encryption is from the cryptography science, which includes coding and decoding of message to protect the safety. Development computer technology makes the encryption even more complicated. The ability for people to break codes is increasing, so are the ability to guard the codes. Many encryptions are available now. They were developed by some hi-tech company and sold, or you can choose some free service. Actually, when you are using the web browsers, emails, or even the basic system, your information has been automatically encrypted.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
During the world wars, the biggest wars in modern history, it was important for countries to send their messages to allies and armies without being detected by other countries. The information transported by secret message, or codes, was usually about tactics, military orders or top secrets. So for the enemies, it was also very crucial for them to break the code and know what their enemy was thinking about. Although code breaking was done in the hidden place that Breaking code was one of the important actions done during the world war in order to reduce the danger but increase the probability of winning.
Cyber Security as an International Security Threat National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face. United States President Barack Obama has identified cyber security as a key issue the nation will face. President Obama declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cyber security (“Foreign Policy Cyber Security,” 2013).”
Cryptography was first used long before the invention of computers. One well-known system was attributed to the reign of Julius Caesar (Klein ix). Another example is the famous Zimmerman telegraph, which was sent from Germany to Mexico during World War I (ix). In a more modern setting, cryptology was mainly used by the government until the late 1970s (Simpson 1). This is largely due to the fact that computers were too expensive, so not many households or businesses had them (1). However, after the computer revolution, cryptology became more public, especially in the business industry where there was a greater need to secure things like transactions (1).
Cyber security is the protection of networks, computers, programs and data from attack, damage or unauthorized access. This is important because a great number of our confidential information is on computers and transmit that data across networks to other computers. As of now cyber-attack is one of the transnational issues that we are concern about in the United States. If these private networks were hack our national security infrastructure will be in distress.
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Security is very important for many different reasons. A nation must insure their safety as a whole, as well as the persons living in the nation. It is equally important that the nation's economy is stable and growing. Security is something that every nation deals with, in many different ways. It is a way that nations come to together and create allies. However, it is also a way for nations to create enemies. There are a variety of concerns that require attention around the world including state security, human security, and economic security. Political and economic relations impact each of these security issues different proven by history and present events around the world.
Cybercrimes are on the rise now. People information are constantly getting hacked. Target computers were recently hacked and over a thousand people credit card information was stolen. Every day we