Nobody downloaded yet

Cryptology and Data Protection - Research Paper Example

Comments (0) Cite this document
Cryptography is an art and science which practices hiding the meaning of messages employing logic to structure, strong encryption techniques (Rouse, 2015). Accomplishing solid encryption, the hiding of data denotation, needs instinctive bounds that permit creative use of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Cryptology and Data Protection
Read TextPreview

Extract of sample "Cryptology and Data Protection"

Download file to see previous pages Some experts argue that cryptography emerged suddenly sometime after writing was discovered (Smith, 2015). With uses stretching from discreet communications to the war-duration combat plans, it is no surprise that new methods of cryptography appeared shortly after the extensive growth of computer communications. Telecommunications and data cryptography is essential when interacting over any unsecure channel, which comprises of almost all networks, especially the Internet (Zimmerman, 1994). This paper discusses the cryptography of information and the protection of data.
Within the framework of every application-to-application communication, there are certain definite security necessities, comprising: Authentication which is the process of confirming a user’s identification (Burgess, 2008). However, presently the internet primary forms of host-to-host authentication are address-based or name-based, which are very weak authentication. Confidentiality/Privacy is safeguarding that no unintended persons can receive the message apart from the projected recipient. Integrity is the state of guaranteeing the recipient that the intercepted message has not been changed in any manner from the original. Non-repudiation is the mechanism to verify that the correspondent really conducted the transaction of sending that particular message (Chandra, 2009).
Cryptography, not only safeguards data from hacking or modification, but can also be used for user identification. There are three forms of cryptographic structures in general normally employed to achieve these objectives. Namely: secret key also known as the symmetric cryptography, hash functions and public-key also known as asymmetric cryptography (Oecd, 2015). In all instances, the first unhidden data is identified as plain text. It is encoded into cipher text, which eventually is decoded into operational plain text (Pezaro, 2015).
There are two keys ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cryptology and Data Protection Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Cryptology and Data Protection Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from
(Cryptology and Data Protection Research Paper Example | Topics and Well Written Essays - 1250 Words)
Cryptology and Data Protection Research Paper Example | Topics and Well Written Essays - 1250 Words.
“Cryptology and Data Protection Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cryptology and Data Protection

Protection of data

...? Protection of Data in Email Communication TASK ONE IFICATION OF EXPLOITING EMAIL SYSTEMS To protect any information technology infrastructure it is necessary to have proper and sufficient security measures such as installation of security devices, configuration of firewall software, implementation of security protocols, and practices of safe and sound procedures. The content of emails and the path through which they travel to reach the destined address are one the most common security threats nowadays (Voltage 2011) Appendix 1 illustrates the interaction amongst various devices used in infrastructure to move emails from place to place around the world. There are number of organizers and...
10 Pages(2500 words)Essay


...?Table of Contents Table of Contents Introduction 2 MD5 Algorithm 2 Data filling 2 Add length 2 Initialing of variables 3 SHA Algorithm 3 Principle of operation of the two algorithms 3 Collision Attacks 4 Cipher text Attack 4 Chosen Plaintext Attack 5 Known Plaintext Attack 5 Replay Attack 5 Thwarting Collisions 7 Streaming data 7 Message whitening and self interleaving 8 Security analysis 9 Summary and conclusion 10 References 12 Introduction In the recent years, information communication technologies have been on a steady growth thanks to the innovations in technology coupled with increasing needs of users to communicate. There is a growing demand for the implementation of cryptographic algorithms and encryption that are robust... in...
10 Pages(2500 words)Assignment

Information Sensitivity and Data Protection

...?TRICARE - Information Sensitivity and Data Protection Military Health System (MHS) maintains the highest standard of information assurance (IA) for TRICARE. The network and information systems’ security measures and patient’s data and info protection efforts, are in compliance with the information IA policies, standards and guidance, issued by the Department of Defense (DoD) (Department of Defense, 2009). All TRICARE operations of information collection, storage, transmission and processing are in accordance with DoD Information Technology System Certification and Accreditation Process (DITSCA). Thus, TRICARE operates in a standardized secure environment that offers...
1 Pages(250 words)Essay

Personal Data Protection

...? Personal Data Protection DQ1-Data protection: We’ve seen that protecting our personal data can be an overwhelming task. As many of us are busy, are we able to protect our data? If we are not able to protect our data, and data protection is left to the market, will data protection be possible only for the rich? Personal protection of data through high-tech means will not still be achievable. Building systems which do help others in respecting personal information,...
3 Pages(750 words)Assignment


...? FUNDAMENTALS OF CRYPTOLOGY by Introduction Modern communication and data transfer across the internet has posed numerous challenges in terms of security and authenticity. Data protection from eavesdropping and potential hackers has seen a rise to complex and fool proof systems to ensure intended recipients get quality data. Issues such as proof of ownership, data integrity, authenticity, and data interception have made protection of sensitive information being transmitted a prime are of concern to parties involved. Furthermore, the user of interconnected computers and breakthrough is file and system...
8 Pages(2000 words)Essay

The Data Protection Act

...Health taking and the Data protection Act The Data Protection Act defines a legal basis for the handling in the UK of information relating to living people. Recording data is just as necessary and important as gathering data. Significant facts should be so recorded that they can be used when and where they are needed. Records must be cumulative, accurate, complete and reliable; there must be space for additional information from time to time. The cumulative record has information concerned with the appraisal of the individual pupil usually kept on a card, sheet, folder, cards in an envelop, or a combination of all. Records should cover...
4 Pages(1000 words)Essay

Data Protection

...Intervention in Private Spheres of Activity for their Intended Public Interest January 18, Data Protection is one of the primary issues in the information society where new technologies have emerged posing new threats to privacy. However, with new technology, advanced ways of facilitating protection have also helped Governments of different countries carefully design explicit legislation to control privacy protection. Surely maintaining the balance between the need for privacy and data protection, on the one hand, and law enforcement, on the other, is no easy task. The tension between the right to privacy, data...
12 Pages(3000 words)Essay

Principles of Data Privacy & Protection

...Is genetic profiling changing the scope of Data Privacy and Protection 26 February 2006 The of this paper questions whether genetic profiling is changing the scope of data privacy and protection. This is an important question, as current privacy and protection laws with regards to personal and private data, are not sufficient to cover genetic data. Data privacy and protection laws are broad and can be contradictory when it comes to protecting our rights with regards to genetic material. The argument is centred on the fact that genetic material is relatively simple to...
20 Pages(5000 words)Essay

Data Protection Regulation and control

...Introduction Data protection has become very important and relevant in the face of increased global rates of fraud and cyber crime. To counter the negative effects of fraud, it is imperative that, organizations come up with data protection policies aimed at curbing data misuse. By establishing a well crafted data protection policy, a company must bear in mind the nature of data, the nature of threat at hand, as well as the resources at its disposal. Data protection refers to the concept, which deals with sharing of data related to individual yet...
2 Pages(500 words)Essay

Data Protection and privacy

...Data protection and privacy In this world of fast phased technology where there is a vast array of data that can now be easily accessed by the use of high technology devices such as computers, mobile phones, wireless GPS devices and applications such as social networking sites, the issue of data protection and privacy is at the verge of breach. People or even acquaintances may unknowingly be able to access personal information in various ways and places that can threaten a person’s privacy and most importantly a person’s security. How can a person be sure of that relevant information given to schools, workplaces, banks, healthcare facilities and even in...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Cryptology and Data Protection for FREE!

Contact Us