Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cryptography's history
Earliest reason for cryptology
Cryptography's history
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cryptography's history
ENCRYPTION
COSC 111
5/7/2013
Cam 2
ABSTRACT
In this research paper I want to shed light on encryption. After careful research it becomes clear that encryption has been around for centuries and used in various ways. There are two distinct methods of encryption: Public Key and Private Key. Each comes with its own set of pros and cons but Private Key is the more widely used method. Laws have been put into place to sanction the use of encryption products and devices. Information has been gathered from several different sources to also explain how encryption has impacted the past and how it will continue to shape our futures.
INTRODUCTION
The object of secure communication is to provide privacy by hiding contents of publicly
…show more content…
Private Key encryption is somewhat complex because of how the key is exchanged between parties. Private Key encryption, also known as symmetric encryption, is where one key will encrypt and decipher information. The benefit of this method is that the process is very fast as a single key is used for both ends of the encryption chain. The problem is protecting the key from others as a single point of potential security failure. Key management is a primary concern when using private key encryption. (Snyder, 2012) In private key algorithms a combination of letters and numbers are used along with multiplication and division to confuse the hackers because they don’t know exactly what is being used to encrypt the …show more content…
One in particular is AES, Advanced Encryption Standard. It is the most commonly used and widespread algorithm to date. (Lindsay, 2011) AES, along with other current encryption schemes, have never been directly broken. With the modern advances in technology it is crucial to have a standard that has proven to be more than reliable and has stood strong in the lines of fire against hackers trying to break the encryption method for whatever reason. Private Key encryption is heavily relied upon to day for one simple reason, it’s hard to duplicate keys when you don’t know exactly what it is that you are trying to duplicate. Imagine how hard it is to break the passcode of someone’s iPhone and how it seems no matter what combination of number you put into the phone, you still can’t manage to get through. Private Key encryption is even more frustrating and difficult than that is, to
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
The NSA is a U.S. intelligence agency responsible for providing the government with information on inner and foreign affairs, particularly for the prevention of terrorism and crime. The NSA maintains several database networks in which they receive private information on American citizens. The agency has access to phone calls, emails, photos, recordings, and backgrounds of practically all people residing in the United States. Started in 1952 by President Harry Truman, the NSA is tasked with the global monitoring and surveillance of targeted individuals in American territory. As part of the growing practice of mass surveillance in the United States, the agency collects and stores all phone records of all American citizens. People argue that this collected information is very intrusive, and the NSA may find something personal that someone may not have wanted anyone to know. While this intrusion's main purpose is to avoid events of terrorism, recent information leaks by Edward Snowden, a former NSA contractor, show that the agency may actually be infringing upon the rights of the American citizen. Whether people like it or not, it seems that the NSA will continue to spy on the people of the United States in an attempt to avert acts of terrorism. Although there are many pros and cons to this surveillance of American citizens, the agency is ultimately just doing its job to protect the lives of the people. Unless a person is actually planning on committing a major crime, there is no real reason for citizens to worry about the NSA and it's invasion of our privacy. The agency is not out to look for embarrassing information about its citizens, rather, only searches for and analyzes information which may lead to the identification of a targe...
We all have heard the quote “Life, Liberty, Land, and the Pursuit to Happiness” and that is the promise of a life here in America. As Americans we pride ourselves on these freedoms that allow us to live everyday. We are one of the only countries that have this promise and it is what draws people from all of over the world to come here. Our founding fathers of the United States of America wrote these words, having no idea the impact that they would have for the rest of this countries history. Those words were the foundation for government, and it wasn’t perfect at first but slowly it matured into what we have today, strong and powerful. To other nations America is seen as the World Power, and a somewhat perfect nation to live in. Unfortunately corruption, scandals and controversies have tainted our once golden glow, and other nations are weary of watching their steps. One of the most controversial elements to our government is the NSA. Hidden in the shadows from American and global knowledge is what the NSA is actually doing and watching out for. Only very recently has the NSA been ripped from the shadows and brought to light what exactly is going on inside those walls. They are “spying” on not only America’s personal data, but foreign leaders as well. The NSA says it’s for the safety for everyone against terrorism and attacks. However, it has gone way to far and violates a constitutional right, privacy. The NSA has overstepped their boundaries, and spying doesn’t seem to make a difference in safety.
Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data. The length of Asymmetric Key Encryption is normally 1024 or 2048 bits. However, in Asymmetric framework the keys with smaller than 2048bits are considered as not safe to use.
The National Security Agency (NSA) is considered to be one of the largest components so the U.S intelligence community stands. It is primarily responsible for gathering intelligence report from detailed communications with the active involvement of the various intelligence tools. It was established in 1952 from the code breaking effort adopted by the handful of military officers and civilians and by and by and by the agency grew in stature and marked its position to gain the role of signal intelligence which is also known as SIGNIT. All of this has resulted from the initiatives taken by the congress and actually it is the congress that helped in providing it the required framework required NSA to carry out its various activities and the enacted laws skilfully guides the limits of NSA. From the perspective of electronic surveillance of US persons and also they are supporting and taking due notice of the public pertaining to the issues at NSA and the related reforms that are directed to make NSA more and more equipped in meeting up with the quotidian technical as well as geopolitical challenges. At present, NSA is constantly coming across multitude of challenges and as well as seeing through a difficult operational environment that brings in certain limitations to its work areas like spending levels for intelligence reports into queries for the future prospects of NSA. The European Parliament has also came forward highlighting the interest of the public who allege that the US along with few other countries are constantly involved in systematic electronic eavesdropping so as to be able to launce the commercial interest of US operations in full effect. (Linda B. 1999)
..., Nicholas G. 2010. “Past, Present, and Future Methods of Cryptography and Data Encryption.” Department of Electrical and Computer Engineering
The paper will deal with two aspects of the privacy-vs-security issue. The first one is concerned with general civil liberties, where privacy is understood to mean freedom to make personal (private) choices in our own homes, control our daily lives and decide with whom we share information that is of our concern – information about our emotions, attitudes, behavior and future decisions and events. The second aspect deals with the privacy vs. security on the internet. Since we live in a technological era, internet has become an inseparable part of our l...
Is the NSA Spying Justified? Benjamin Franklin once said, “They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” By saying this, he means that the violation of rights for national security is not justified. Because I agree with Benjamin Franklin in this statement, I am strongly against the mass collection of data by the NSA. Because the NSA surveillance of us does nothing but hurt us, the collection of data is where the line between national security versus personal liberty must be.
RSA encryption is the foundation of public key cryptography security products. For example, credit card companies use the RSA algorithm for customers’ individual online WebPages. The credit card companies publish a big number on WebPages, which is made by big prime numbers using the RSA algorithm. Since neither computers nor people can factor such big numbers, the RSA encryption system has secured many customers’ information.
In the worst case, an entire database of private data could be accessible to the attacker and whomever he or she chooses to share it with. To prevent the recovery of this key by repeated guessing of each possibility, called a “brute force” attack by cryptographers because there is no intelligent method behind it, the key is made relatively long. Even with the rapid throughput of computer processing, a standard computer could take many thousands of years to try all of the potential 128-bit long keys. In response to the increasing resistance of encryption designs to these brute force attacks, security researchers have identified more complex methods of attack on encryption which use the analysis of physical characteristics to obtain the encryption key (Liu, Chang, & Lee, 2012). These methods are known collectively as side channel
A security certificate is like a special deportation warrant in which the Canadian government can deport any “non-Canadians” who they feel are a threat to Canada and its citizens. An example of this would be anyone that the Canadian government feels is involved with a terrorist group or organization will be deported using a security certificate. Some pros to the security certificate are it will help the Canadian government better protect Canada by deporting anyone who poses a serious threat to Canada, and its citizens. Another pro is it limited in use as security certificates have only been used 27 times since 1991, meaning the powers of the security certificates have not been abused as of yet. It is somewhat fair to the person a security certificate
When the entire body of knowledge concerning passwords is evaluated a few things become abundantly clear. First, passwords are going to be around for some time yet. There simply are no present alternatives that are cost competitive with passwords or that users can adopt in a successful manner. While it is certainly a noble effort to explore replacements for passwords, we cannot refuse to acknowledge their continued existence in the foreseeable future.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: