Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cryptography's history
History of encryption technology
Cryptography's history
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cryptography's history
Cryptography is the study of secure or secret communications. Cryptography has been around for thousands of years. Cryptography has been around for thousands of years. Cryptography deals with authentication, confidentiality, and integrity of data. There are many different implementations of cryptography in information systems. This paper will cover hashing, encryption, digital signatures, and digital certificates.
Cryptography dates back as early as the Egyptian Hieroglyphs that were carved into the Pyramids and other Egyptian artifacts. They are necessary designed to be secret but do pose the intrigue of anyone who wants to read them. Unless you understand the glyphs you would not be able to understand the code. This is similar to cryptography today. Unless a person has a key to unlock the code, they are left with cipher text. Julius Caesar came up with one of the very first substitution ciphers. This was a simple shift cipher. The letters of the alphabet were shifted based on a predetermined number known only to those involved in the conversation. The Scytale was another early device used for cryptography. A leather strap was wound around a stick of a specific diameter. The message was then stamped into the leather. If the message was intercepted, the leather strap was useless without the stick with the specified diameter. Cryptography was used in both World Wars. The Germans had the Enigma machine which allowed the Germans to communicate securely with other German forces. This was very difficult to crack, but ultimately the code was broken. The United States and other Allies used several Native American tribes to use their native language to convey messages. The Navajo were very popular due to their languag...
... middle of paper ...
...thods discussed in this paper will ensure that the business has shown due diligence in its efforts to secure data.
Works Cited
Kahn Academy (2013, February 21). Diffie-Hellman Key Exchange (part 2) [Video file]. Retrieved from https://www.youtube.com/watch?v=dRUVG7YI1_k
Khan Academy (2013, February 21). Diffie-Hellman Key Exchange (part 1) [Video file]. Retrieved from https://www.youtube.com/watch?v=ko62sibi668
Kahn, D. (2008). The Navajo ¡°Windtalkers¡± by David Kahn. Retrieved April 11, 2014, from http://david-kahn.com/articles-navajo-windtalkers.htm
Kulkarni, S., Chole, V., & Prasad, P. S. (2014). Review on Authentication Mechanisms of Digital Signatures used for Certification. International Journal of Computer Science and Mobile Computing, 3(2), 735-738.
Whitman, M. E., & Mattord, H. J. (2011). Principles of Information Security. Boston: Course Technology.
Wheelwright, M. (1942). Navajo Creation Myth. Navajo Religion Series, Vol. 1. Santa Fe: Museum of Navajo Ceremonial Art.
In July 2015, many of the world’s high ranking cryptographers published that the loss and destruction induced by adopting a key escrow system 20 years ago would be even more serious, that would be very hard to identify security weaknesses that could be misused by
This program uses mainly on the concept of cryptology. Cryptology is the study about secret communication between two parties, where there is a presence of a third party known as adversaries, and that party knows nothing about the content of the communication (Rivest, 1990).
Witherspoon, Gary. Language and art in the Navajo universe. Ann Arbor: University of Michigan Press, 1977. Print.
Polyalphabetic substitution ciphers were developed during the Renaissance period in Europe and were the dominant type of encrypting for confidential messages during both World Wars. The Second World War was one that was considered especially technological. Cryptography was very important and whoever would break the other side’s code would have an enormous advantage in the war. In the end, the British with the help of Alan Turing broke the German code “Enigma” and the Americans broke the Japanese code “Purple.”
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
PKC is the enabling technology for all Internet security and the increasing use of digital signatures, which are replacing traditional signatures in many contexts. However, RSA is better than PKC because RSA doesn’t need digital signature. As a result, the RSA algorithm turned out to be a perfect fit for the implementation of a practical public security system. In 1977, Martin Gardner first introduced the RSA system. After 5 years, company RSA used secure electronic security products. Nowadays many credit companies of all over the world use the RSA system or a similar system based on the RSA system.
Lv, X., Li, H., Wang, B. (2012) Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks ISSN: 19390114
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
My knowledge has grown over the past six years, outwith the areas of learning offered by school courses, and I see this course as an opportunity to gain new skills and broaden my knowledge further. My main interests are varied, including communications and the internet, system analysis and design, software development, processors and low level machine studies. I have recently developed an interest in data encryption, hence my active participation in the RSA RC64 Secret-Key challenge, the latest international de-encryption contest from the RSA laboratories of America.
N.p., July 2011. Web. 2 Mar. 2014. . "RSA Public Key Encryption – The Code That Secures The internet.
Information security plays a central role in the deployment of modern communication systems. The most important objectives of information security are authentication, confidentiality, data integrity and non-repudiation. Confidentiality ensures that information is accessible only to those authorized to have access. Authentication is the process proving the identity that assures the communicating entity is the one that it claimed to be, this means that the user or the system can prove their own identities to other parties who don’t have personal knowledge of their identities. Data integrity ensures that the received information has not been altered in any way from its original form. Data integrity safeguards the accuracy and completeness of information and processing methods. Non-repudiation is a mechanism used to prove that the sender really sent this information and the information was received by the specified party, so the recipient cannot claim that the information was not sent. Communication systems are widely interconnected and interdependent and use the same technologies to create a uniform digital world. In this era of digital information system resources are not safe from attacks. Public and widespread use of digital tools in communication quickly causes the creation of secure mechanisms. Cryptography technique is one of them. Cryptography is the basic encryption method used in implementing security. The word cryptography comes from the Greek word "Kryptos", that means hidden, and "Graphikos" which means writing. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, the science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth...
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: