Understanding Cryptography - Essay Example

Comments (0) Cite this document
Internet communication, wireless networking, mobile computing, and cloud computing are some of the trends shaping the computing and communication industry. All organizations are embracing such new technologies in a bid to enhance their performance and gain a competitive edge…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Understanding Cryptography
Read TextPreview

Extract of sample "Understanding Cryptography"

Download file to see previous pages Cryptography is somehow omnipresent going beyond the conventional environments such as banking systems, government communications among others (Christoff, 2009). Cryptography is now used in web browsers, cell phones, e-mail programs, embedded software, manufacturing systems, cars, medical plants, smart buildings among others (Christoff, 2009).
Therefore, designers and system users need to understand comprehensively the concept of cryptography and how it is applied in order to appreciate its effectiveness in securing wireless networks and communication.
According to Christoff (2009), cryptography is the study and practice of techniques for securing communication particularly in the presence of a third party (adversary). Essentially, cryptography is mainly concerned with the development and determining protocols that protect against the influence of third parties in communication and networking. It also analyzes protocols and mechanisms that are related to information security aspects including data integrity, confidentiality, non-repudiation and authentication (Paar & Pelzl, 2010). Over the years, various techniques similar to encryption have been used as cryptography. However, modern cryptography borrows from disciplines of computer science, mathematics and electrical engineering among others. Cryptography is predominantly used in computer passwords, e-commerce, and ATM cards. It employs several tools and techniques to implement the security needed for the various applications (Christoff, 2009).
OpenSSL is one of the tools of cryptography that implements the SSL and the TSS security protocols in the network (Viega, Messier, & Chendra, 2002). It is mainly used in many web servers to transmit packets in encrypted form rather than in plain readable text. Open SSL has a core library that is developed in C programming language and is used for the implementation of the basic cryptographic functions and the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Understanding Cryptography Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Understanding Cryptography Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1668586-understanding-cryptography
(Understanding Cryptography Essay Example | Topics and Well Written Essays - 1000 Words)
Understanding Cryptography Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1668586-understanding-cryptography.
“Understanding Cryptography Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1668586-understanding-cryptography.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Understanding Cryptography

Cryptography & Coding

...is; lastly, there is still the rarely military breach that outline the personal data and information of people who certainly value their confidentiality very much (Martin, 2006). Encryption and Cryptography According to (Hoffer et al., 2007, p.509), encryption is the coding or scramble of data with the intention that humans cannot understand it. The purpose of data encryption is to protect highly sensitive data for instance, customer credit card numbers or account balance. Encryption is commonly utilized in electronic funds transfer systems. Any system that presents encryption facilities must also offer compulsory routines for decoding the data. These decoding routines require adequate security,...
14 Pages(3500 words)Essay

Cryptography and Computer Security

...problem came with the introduction of internet. Internet gave birth to many problems because the internet gave rise to many virtual access points. Access points are an entrance to every sort of information and along with the information that enters virus and other malwares can easily enter. This opened a gateway to many virus and unwanted material into the computer. In order to protect the computer from such threats many techniques and methods were adopted and up till now new techniques and soft wares are being developed to protect the computer. One such method of protecting data is cryptography. It was used to convert understandable data into data that cannot be understood. In the earlier years...
9 Pages(2250 words)Essay

IT - Attacking Cryptography

...-27, 1998, Proceedings (Lecture Notes in Computer Science) Springer. Popov, Dmitri. Hands on Open Source Lulu.com. Paar, Christof, Jan Pelzl, and Bart Preneel. Understanding Cryptography: A Textbook for Students and Practitioners Springer. Stinson, Douglas R. and Stafford Tavares. Selected Areas in Cryptograpy: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000: Proceedings Berlin ; Springer, 2001. Schneider, Gary P. Electronic Commerce Course Technology. "Twofish." 2007.Network Dictionary: 500-500. Yazici, Adnan and Cevat Sener. Computer and Information Sciences -- ISCIS 2003: 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings (Lecture...
5 Pages(1250 words)Essay


...Error correction is an important concept in cryptography and computer science. They are used in various solutions in computer science. This paper will look at the application of fuzzy error correction in the field of communications. The main intention of an error correcting code is to allow a message to be transmitted in an intact manner over a channel which is noisy and still maintain a good state. This process is achieved by having a mapping of m to a string, c, which is longer than m, before transmission. The construction of c is done in such a way that there are elements which are redundant in it. This will, therefore, enable the receiver to reconstruct c even if some bits of c are corrupted by noise; the receiver...
4 Pages(1000 words)Research Paper

Cryptography Attacks

...?Cryptography Attacks Cryptography is a science of communication that specializes in secure communication in the presence of a third party commonly referred to as adversaries. According to the Oxford English dictionary, an adversary is an enemy or a person who poses an amount of risk to others. Cryptography is a science of secure communication using unique codes to disguise the information thereby making it inaccessible by third parties. Presumably, the American government has a several enemies all of which will do anything to access some of the information in the government databases (Oded, 2001). This is further compounded by the constant need for government agencies to share information over the common means of communication... or...
5 Pages(1250 words)Research Paper

IPSec and Cryptography

...?Running head: Research Paper, Computer Sciences and Information Technology Research Paper, Computer Sciences and Information Technology IPSec and Cryptography Introduction The major source of security for the IP network layer is the Internet protocol security (IP sec). This implies that the security of all the IP packets is granted, regardless of the superiority of the protocol being transported in the packet payloads. When using the internet security protocol, the applications do not require further reengineering. This is because; the security offered by the IPsec can be made transparent to final users. IPsec is very vital since it offers numerous solutions to virtual private Networking (VPN), by giving communication...
5 Pages(1250 words)Research Paper


...and periodic changes to pace up and counter the threats that are ever increasing. We will use blowfish algorithm with the Secure Socket layer v3. Similarly, cryptography also goes with the same approach of upgrading new state of the art encryption algorithms one after another and from safe to the safest, so that it cannot be cracked. The tool utilized in this scenario is ‘keepass’ that is an open source tool for storing all the passwords in a database that is encrypted (Popov). The database can also be encrypted by blow fish (Anonymous2007, 71-71), as it incorporates no weak keys and the design is simple and understandable that supports analysis, algorithm integrity and repeatable block ciphers...
4 Pages(1000 words)Research Paper


...summarize the uses of basic cryptography in your organization. You will want to find out such things as whether you use checksums, disk encryption, VPNs (virtual private networks), link encryption and SSL for your Web site. Find out who's responsible for these tools Information and Computer Technology has facilitated countless aspects of the business process and has automated numerous work tasks. Its adoption by organisations and its subsequent integration into the business process have proven invaluable. At the same time, however, it has led to countless security issues and, as a rule of thumb, has imposed the imperatives of adopting cryptographic techniques and technologies by organisations who engage in any form of...
4 Pages(1000 words)Essay

Cryptography Application Methods

...Cryptography Application Methods Cryptography Application Methods Cryptography is the process of transforming a text that is clearinto incomprehensible format. Business enterprises predominantly use cryptography during their storage and transmission of messages carefully for reading by the intended recipients. Cryptography has several applications and methods. In the past, it was used in assuring secrecy. The authenticity of the sender and integrity of the media were secured through the use signatures, wax, and other physical attributions. However, the introduction of electronic transfer transformed the use of cryptography into electronic...
2 Pages(500 words)Research Paper

Quantum Cryptography

...Running Head: QUANTUM CRYPTOGRAPHY QUANTUM CRYPTOGRAPHY By Quantum Cryptography Quantum cryptography’s main strength is its predominantly good way of generating long, arbitrary codes (Cobourne and Cid, 2011, p. 5). A second strength of quantum code allocation is that one can use a more or less short input to produce ideally secure and arbitrary codes. This feature allows two users to share a secure code and validate the original quantum dialogue. Applying part of the product of this QKD term to validate an upcoming QKD term shows that the approaching session is also ideally secure. As a result, one can run QKD terms nearly continuously without losing security while...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Understanding Cryptography for FREE!

Contact Us