Preview

2.1.2 Cryptography Facts

Good Essays
Open Document
Open Document
665 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
2.1.2 Cryptography Facts
Cryptography is the science of converting data into a secret code to hide the meaning of the message during transmission. Cryptographic systems provide the following security services:
• Confidentiality, by ensuring that only authorized parties can access data.
• Integrity, by verifying that data has not been altered in transit.
• Authentication, by proving the identity of the sender or receiver.
• Non-repudiation, by validating that communications have come from a particular sender at a particular time.
The following terms are related to cryptography:
Term Definition
Plaintext Plaintext is a readable message.
Cipher text Cipher text is the message in a form that makes it unreadable to all but those for whom the message was intended.
Cryptographer A cryptographer is a person who develops ways of converting plaintext to cipher text.
Cryptanalysis Cryptanalysis is the method of recovering original data that has been encrypted without having access to the key used in the encryption process. This can be done to measure and validate the strength of a cryptosystem. It can also be done to violate the confidentiality and/or integrity of a cryptosystem.
Cryptosystem A cryptosystem is the associated items of cryptography that are used as a unit to provide a single means of encryption and decryption.
Cryptology Cryptology is the study of cryptography and cryptanalysis.
Key A key is a variable in a cipher used to encrypt or decrypt a message. The key should be kept secret.
The key space is the range of the possible values that can be used to construct a key. Generally speaking, the longer the key space, the stronger the cryptosystem.
Algorithm A cipher or algorithm is the process or formula used to convert a message or otherwise hide its meaning. Examples of algorithms include:
• A transposition cipher (also called an anagram) changes the position of characters in the plaintext message.
• A substitution cipher replaces one set of characters with symbols or

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Use the following encryption algorithms on the following message and record the result: “You Deserve an A”. You may use one of the readily available tools on the Internet to perform this encryption. Please provide the link (URL) of the tool you used.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Message Encoding involves converting the information the host wishes to send into the appropriate medium for transmission. Messages sent across networks are converted down into bits by the sending host and then encoded into a pattern of sounds, light waves, or electrical impulses, depending on the network medium over which the bits are being transmitted.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    6 Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Navajo Code Talkers

    • 993 Words
    • 4 Pages

    During War World II, the United States needed a secure and immediate way to transmit messages and communicate by telephone and radio in a code that could not be broken by the Japanese. Cryptography is the science or study of writing or solving codes; which made this war effort difficult to accomplish. America succeeded this goal with a code that was not based on any type of science, mathematics, or substitutions, but on a language. This system of massaging and communication was known as the Navajo code and was the most sufficient, secure, and fastest to date.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    1. Cryptography is needed for mobile devices and media, as well as protections and encryption on any company systems and hardware.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Data Encryption Standard (DES), ROT13, and Enigma are all examples of algorithm for the encryption of electronic data…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Encoding : This is the process of converting the information into a form that can be correctly decoded at the other end by…

    • 2906 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Encryption

    • 551 Words
    • 3 Pages

    According to searchsecurity.techtarget.com, “Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.” In order to understand the data or the message that is being sent, the receiver must be able to decrypt the message. Decryption thus refers to the process of converting the message from cipher text into its original format or plaintext whereby the reader would be able to understand the message. Encryption is used to ensure the confidentiality of a message that is being sent is not compromised as in case of the message being intercepted, it ensure that only authorized individuals are able to understand the contents. As technology has been advancing, the complex nature of encrypting and decrypting messages have also been advancing. Individuals and experts now create even harder to crack algorithms and formulae for encrypting data. Despite this, there are quite often ways in which a captured message can be decrypted without the use of brute force.…

    • 551 Words
    • 3 Pages
    Good Essays
  • Good Essays

    2) Encoding. This usually is in the form of a language (either written or verbal) that the receiver will be able to understand.…

    • 1331 Words
    • 6 Pages
    Good Essays

Related Topics