Preview

Cryptography Research Paper

Better Essays
Open Document
Open Document
3123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptography Research Paper
I. What is Cryptography? Do you have a message which is so confidential that you need to send to a certain person but you’re afraid that somebody might read it? Well you better study about CRYPTOGRAPHY. But first what is cryptography? Cryptography is the study of hiding readable messages (plaintext) into a non-readable form (ciphertext). Based on my other source Cryptography is the practice and study of techniques for secure communication in the presence of third parties. To make it simple, Cryptography is used in order to make sure that your messages and data are secured from other elements. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext will result to meaningless data called ciphertext. We use encryption in order to hide the information from anyone whom is not intended even if they can see the encrypted data. But maybe you are curious on how your receiver will be able to read the unreadable message? Well if there is encryption, there is also decryption which is the reverse, in other words, moving from ciphertext back to plaintext. But in order to decipher a ciphertext, you should know the key used by the sender. A key is a usually a short string of characters, which is needed to decrypt a certain ciphertext.

Figure 1.1 Encryption and decryption Cryptography can be strong or weak. Cryptographic strength can be measured in the time it takes for one to recover the plaintext. The result of strong cryptography is a ciphertext that is very difficult to decipher without possession of the proper decoding tools. According from another source, Cryptography is where security engineering meets mathematics. It provides us with tools that underlie most modern security protocols. It is widely used in the modern era to protect distributed systems from the wrong thing, or used to protect them in the wrong way. Cryptography based on my other references is the study of methods to send and receive

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. If I was an intelligence officer, something I could learn from this weak encryption is that if I need to send a message, I need to definitely use something more complex, because when using substitution, once someone catches on to the pattern, it will get easier and easier to code the message . Honestly, I would use stenography as much as possible.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2147 Words
    • 9 Pages

    Public key cryptography uses a pair of mathematically related cryptographic keys. If one key is used to encrypt information, then only the related key can decrypt that information. Even if one of the keys is known, the other key cannot be easily calculated. Public key system consists of the following:…

    • 2147 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Can you imagine a machine so important that without it, democracy wouldn't exist. A machine that has undoubtedly changed the face of the Earth and the modern world whether we know it or not. If it wasn't for this device, generations ahead of its time, we would still be under the rule of Hitler in an imperialist dictatorship. This device is none other than the Turing Machine. It is a machine that was created in 1912 and named after its creator Alan Turing. The machine was a result of the Allies need to be able to decode the encrypted messages of the Natzi. It would take days just to decode one line of encrypted Natzi messages, which could have had viable information as to where they might be planning or even worse where they were going to attack. The Enigma machine which was very inefficient. The Turing Machine was able to take this code and decrypt it in a time much faster than the Enigma Machine used at the time.…

    • 709 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Password Theft

    • 6445 Words
    • 26 Pages

    The authentication system (used during login) stores enciphered images of user passwords but not the actual passwords. This protects passwords from being divulged if an attacker happens to read the file.…

    • 6445 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Public Key Encryption

    • 330 Words
    • 2 Pages

    Public key encryption is a type of cryptographic system where each party has both a private and a public key, which are mathematically linked to each other. The public key is used for encrypting plaintext to “ciphertext” (essentially, gibberish), while the private key is used for decrypting that gibberish back into plaintext.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6th Sense Technology

    • 951 Words
    • 4 Pages

    * Cryptosystem (Cipher System) – method of disguising messages so that only certain people can read them…

    • 951 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    djjjj

    • 3335 Words
    • 11 Pages

    A form of data security is encryption, encryption works but scrambling letters and numbers into an unreadable code. Only the authorized users will have the key to unscramble the code and get the correct data.…

    • 3335 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    usrt

    • 392 Words
    • 2 Pages

    Encryption can be a useful deterrent in keeping sensitive information out of the hands of those not authorized and for maintaining the security of a network. Some encryption schemes utilize a secret key and a public key. Each person on the protected network has both a public and a secret key. Everyone who wants to be able to send encrypted information to another person on the network uses the public key. The recipient then uses a secret key to decrypt the information sent. A user must have a secret key to unlock the information.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Generations: 4g Technology

    • 2795 Words
    • 12 Pages

    Communication is exchange of ideas. Communication plays a very imp role in life. In early days people use to send messages through pigeons and letters. Later through telegrams. But this way communication is very slow. Telephones are replaced by telegrams, letters. Mobile completely revolutionalized communication bcoz it is the fastest way of communication.…

    • 2795 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    The two most basic terms related to cryptography are Encryption and Decryption. These terms play a crucial role in bringing up this topic, and have been discussed in detail. The other terms that are crucial related to this topic is Secret Keys and Ciphers (upon which our entire report is based).…

    • 423 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the…

    • 1368 Words
    • 6 Pages
    Powerful Essays

Related Topics