StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How Do You Keep a Secret: the History of Cryptography - Essay Example

Cite this document
Summary
The paper "How Do You Keep a Secret: the History of Cryptography" outlines cryptography that has been used for a long time and it has reached the level of encryption now, where the trapdoors are such that it is next to impossible for code breakers to decipher the message without knowing the key…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
How Do You Keep a Secret: the History of Cryptography
Read Text Preview

Extract of sample "How Do You Keep a Secret: the History of Cryptography"

The military used to cipher messages by the skytale method, which involved a leather belt with a code on it and a tapered wooden stick on which the leather belt was wound to decipher it. Julius Caesar used a simple substitution method for his cipher, a technique Emperor Augustus took a liking to as well. However, these ciphers were easy to decode, therefore, new techniques of ciphering were introduced, which included shifting the cipher code regularly, ignoring blanks, and shifting letters in a group of a certain number.

Moreover, since letters are used in a language in a certain frequency, it is very useful to employ such techniques, as they entail not using the same cipher/code for the same letter. Also, such ciphers have an arithmetic formula as their key which makes it easier to remember and harder to find on a spy, as against a, say, notebook or a list of ciphers.Another ciphering technique is the matrix substitution method, whereby a matrix grid is used to cipher letters in groups. In the transposition cipher, a rectangle of a certain dimension is used to write down the message and then only the dimensions of the rectangle are needed to decipher it.

However, the latest technique in the art of ciphering is the trapdoor, whereby it is very easy to track down the code with the key; however, the key is so hard to find that it is next to impossible to crack the cipher without the help of that key. Such encryption is used to encrypt emails, bank accounts details as well as satellite TV broadcasts.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(How Do You Keep A Secret: the History of Cryptography Essay, n.d.)
How Do You Keep A Secret: the History of Cryptography Essay. https://studentshare.org/history/1882590-how-do-you-keep-a-secret
(How Do You Keep A Secret: The History of Cryptography Essay)
How Do You Keep A Secret: The History of Cryptography Essay. https://studentshare.org/history/1882590-how-do-you-keep-a-secret.
“How Do You Keep A Secret: The History of Cryptography Essay”. https://studentshare.org/history/1882590-how-do-you-keep-a-secret.
  • Cited: 0 times

CHECK THESE SAMPLES OF How Do You Keep a Secret: the History of Cryptography

Procopius secret history

Name: Instructor: Course: Date: Procopius Secret history Introduction Procopius is one of the most controversial of first medieval writers.... In this publication, the author, Procopius alleges to reveal the true dealings of Emperor Justinian.... Procopius is the most essential resource of information concerning the administration of Emperor Justinian....
3 Pages (750 words) Essay

Error Correction in Cryptography

Name: Course: Tutor: Date: Error correction is an important concept in cryptography and computer science.... They are used in various solutions in computer science.... This paper will look at the application of fuzzy error correction in the field of communications.... hellip; The main intention of an error correcting code is to allow a message to be transmitted in an intact manner over a channel which is noisy and still maintain a good state....
4 Pages (1000 words) Research Paper

The Secret Life of Bees

The secret Life of Bees was written by Sue Monk Kidd, as a story about Lily, a fourteen year old girl who had a fascination for discovering bees emerging from the walls of her bedroom.... Her mother died from an accidental gun shot, supposedly Lily having inadvertently The secret Life of Bees The secret Life of Bees was written by Sue Monk Kidd, as a story about Lily, a fourteen year old girl who had a fascination for discovering bees emerging from the walls of her bedroom....
2 Pages (500 words) Essay

Differentiate between the different types of cryptographic algorithms

An Overview of cryptography.... In cryptography, a key refers to a… There are various forms of classifying Cryptographic algorithms.... In cryptography, a key refers to a sequence of bits which long and used in decryption or encryption algorithms.... These are secret key cryptography, public key cryptography and hash functions (Schneier, 2007).... he second cryptographic algorithms are the public key cryptography....
1 Pages (250 words) Essay

Secret Talks on Radio by Dan Shelley

The author of the present essay "secret Talks on Radio by Dan Shelley" explains that Dan Shelley first got into news coverage because he thought he could have any effect.... This paper will discuss how the perception of the media has changed about the article “secret talks on radio” by Dan Shelley.... Taking into account the cliché say about the media, “they only give you what they want you to hear....
2 Pages (500 words) Essay

Cryptographic Failures and Challenges

cryptography is a technique used in keeping and passing on information in a particular outline such that, only for whom the data is proposed can understand and process it.... The error enabled Cryptographic Failures and Challenges Affiliation cryptography is a technique used in keeping and passing on information in a particular outline such that, only for whom the data is proposed can understand and process it.... In conclusion, cryptography is very vital as it invention was meant on secrecy and, therefore, there should be some ways of ensuring that they uphold their mandate....
1 Pages (250 words) Assignment

Nothing Kept Secret

nbsp; Hoping to carry on an affair with her, he offers to keep their illicit love a secret.... This essay "Nothing Kept secret" discusses the good things we do.... nbsp; In his mind, as long as their sinful meetings are kept secret, then there is no sin because they are able to escape public condemnation.... nbsp; And Luke states clearly that nothing hidden can stay hidden, and all things, though kept secret, shall be exposed....
1 Pages (250 words) Essay

Cryptography and Information Assurance

… The paper " cryptography and Information Assurance" is a  remarkable example of an assignment on information technology.... The paper " cryptography and Information Assurance" is a  remarkable example of an assignment on information technology....
16 Pages (4000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us