Preview

Networking

Powerful Essays
Open Document
Open Document
1382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Networking
Cryptography is derived from the Greek words kryptos meaning “hidden” and graphien, meaning “to write/study”. The process of making and using codes to secure the transmission of information is called cryptography. Before modern era cryptography was synonymous to encryption but today cryptography is heavily based on mathematical theory and computer science practice. Cryptography today deals with the ways to transfer information in such a manner that no one beside the recipients can read what was actually sent and also more advanced crypto techniques deal with ensuring that the information being transferred has not been compromised in the transit. Cryptanalysis is the process of obtaining the original message (Plaintext) from an encrypted message (ciphertetext) without knowing the algorithms and keys used in encryption. Crypto is a tool that can be used in both good and bad ways. Some of the good crypto uses are:
• Protecting the location of our troops in war zone
• Protecting the nuclear launch codes
• Protecting national security information
• Protecting research data
• Protecting a new research idea

2. Cryptographic Algorithms
Cryptographic Algorithms are the set of rules used to encipher and decipher messages in a cryptographic system. It is a process which uses encryption allowing only authorized party to access the information. Cryptographic algorithms are grouped in two categories:
• Symmetric-key Cryptography
• Asymmetrical -key Cryptography

2.1. Symmetric key Cryptography
Symmetric Key Cryptography uses the same cryptographic keys to encipher and decipher the message using symmetric encryption. The sender and receiver share the same key. Symmetric encryption method use mathematical operations that can be programmed into extremely fast computing algorithms which makes encryption and decryption of the messages quick even with the small computers. With the Symmetric encryption the secret key should be send through different channel or band to

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    HSC LEVEL 3 Unit 107

    • 861 Words
    • 3 Pages

    1.1 - Communication is a two way process and is how a person will send a message and how a person will receive and understand the message. Communication is not only about the words used but the manner in which you use them. The main feature of two way communication is the flow of information from both ways. This process is called a communication cycle. Communication always has a purpose and this may be to pass on information or an idea, to express a need or want to persuade someone to do something, share confidential information and share or express emotions. A message coded is when an individual thinks about how they are going to say what they are thinking and decides in what form the communication is, this could be in spoken words or sign language. An individual will then put it into this form. A message understood is if the message has been communicated clearly and the other person has concentrated and there are no barriers to communication, the other person understands the message. They show they have understood by giving feedback. The stages of the communication cycle are repeated backwards and forwards as long as the conversation goes on.…

    • 861 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    1. Cryptography is needed for mobile devices and media, as well as protections and encryption on any company systems and hardware.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Psychology Key Terms

    • 540 Words
    • 3 Pages

    algorithms - An algorithm is a set of instructions for solving a problem or completing a process…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    network

    • 810 Words
    • 4 Pages

    1.Which of the following terms is the cloaet synonym to the term computer networking? Protocol…

    • 810 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    The American Civil War created a new urgency for techniques in both cryptography (the manufacture of codes and ciphers) and cryptanalysis (the breaking of codes and ciphers). It also introduced new…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Binary Code

    • 597 Words
    • 3 Pages

    Here's an example of the Binary Code in action: When you type the letter A on your keyboard, electrical signals are sent from the keyboard to the CPU. The CPU turns the signals into binary code. Then, the computer reads the code and sends it on to the monitor to display the letter A.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The communication process begins with the sender (or transmitter) formulating a message they wish to transmit. The sender ‘encodes’ the message ie decides what they are going to say and how they will say it. The message is next transmitted via the most appropriate means to be successfully received. Once…

    • 2645 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. When Julius Caesar sent messages to his generals, he didn 't trust his messengers. Subsequently, he devised a method of disguising his messages so only the intended recipient could decipher it. Only someone who knew Caesar’s "shift" rule could decipher his messages (Network Associates, Inc., 1990-1999). The Caesar cipher is one of the earliest known and simplest forms of cryptography. It is a type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on (Lyons, 2009 - 2012). Caesar’s encryption method would be known as symmetric cryptography today.…

    • 1325 Words
    • 6 Pages
    Better Essays
  • Good Essays

    This communication process is divided into several basic components such as a sender transmits a message through a channel to the receiver. The sender first develops an idea which is composed into a message and then transmitted to the receiver that is who is interprets the message and receives meaning. Developing a message is known as encoding. Interpreting the message is referred to as decoding.…

    • 521 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In a world where identity theft is on the rise, hackers are hard at work trying to get people’s credit card numbers, and where companies are getting your information to sell you unwanted things, tight security has become a large factor of keeping the personal and confidential information of our society safe. Cryptology and Cipher codes are commonly used ways to keep confidential information protected by preventing people not in on the secret from understanding what is being transmitted. Cryptology is the science of secure communication which is also the encoding and decoding of data. Cipher codes are more complicated because it is a method used to transform a message into an obscure form. The use of these secured messages has been dated back to the first societies of the world where they were used for many of the same reasons they are today. The first use of written cryptology was believed to take place at about 1900 B.C when an Egyptian scribe first used a non-standard form of hieroglyphics in his writing. Then in 1500 B.C in Mesopotamia (common day Iraq), an enciphered message in cuneiform was used to conceal a formula to make glazes for pottery. In the years 500 through 600 B.C, Hebrew scribes used a reverse alphabet simple substitution cipher to write the book of Jeremiah which was known as ATBASH. The Greeks used a device called a scytale (rhymes with Italy) in 487 B.C which consisted of a strip of leather that was wrapped and then written on then used as a belt which the recipient would be wearing as well and that would decode the message. The famous Julius Caesar used cryptology to keep government communications private throughout 50 to 60 B.C. Even the first president of the United States George Washington used encoded messages to send to his fellow soldiers. Therefore, cryptology and cipher codes have played large roles in the confidentiality of societies in the past…

    • 1725 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The DES algorithm works on the Feistel Cipher principle, and the AES algorithm works on substitution and permutation principle.…

    • 734 Words
    • 3 Pages
    Good Essays