Encryption - The Art of Hidden Messages

2195 Words5 Pages

Introduction

Encryption - The Art of Hidden Messages

Cipher is used in cryptography for the algorithm purposes. The algorithms include the encryption and the decryption which includes of well defined series of steps that can be followed as a procedure. But sometimes we get the word cipher in a non technical usage which means a code. But this was distinguished from codes when it came to the classical cryptography. To put this information clear, they were used to operate the substitution depending on a large code book that linked characters or figures to a word or phrase. For instance, the code UQJHSE could mean the same as the sentence “Proceed to the following coordinates.” But when it came to cipher, the UQJHSE could mean a plaintext or any other information that a sender would wish to transmit to a receiver (Gershaw, 1989). That was according to cipher, while when it comes to the encrypted form it was known as the ciphertext which had all the information concerning any of the plaintext but was unreadable mostly to the human or any computer without any mechanism to decrypt it. In any operation of the cipher, there must be a key which is always a piece of the auxiliary information. On the other way it can also be termed as a cryptovariable.

The procedure of the encryption depends on the key that is used to change the details of the algorithm operation. It would much difficult to decrypt the resulting ciphertext into a plaintext which is readable if a person does not have any information concerning the key. In most modern, they can be categorized in two ways. The first is block ciphers and a stream ciphers. The block cipher means working on the blocks of symbols which are usually of a fixed size while the stream cipher means w...

... middle of paper ...

...site of the other one. The device that is used for the computation purposes and makes the direct use of phenomena of the quantum mechanical which includes entanglement and superposition to do any operations on data is known as the quantum computer. They are different from the traditional computers which are based on the transistors. The quantum properties are useful in such a way that they can be used to carry out operations and represent data on these data (Mayer, 1984).

Works Cited

Gershaw, D. (1989). The History of the encryption messages. California: University press.

Levenson, H. (1973). The historical ciphers, that comprised of the pen and paper. Journal of Technology, 41, 397-404.

Lynch, S. (2002). Computers and the early technology. New York. Information age Press.

Mayer, R. (1984). The Current Applications of the Encryption. Pearson Education, Inc

Open Document