StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cryptography & Coding - Essay Example

Cite this document
Summary
Cryptography Author Author Affiliation Date Table of Contents Abstract As the technology advances the need for effective tools and applications also grows. This progress in the technology brings a number of facilities and easiness in every field of life. However, the technology emergence also presents some problems regarding the user data and information security and privacy…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Cryptography & Coding
Read Text Preview

Extract of sample "Cryptography & Coding"

Download file to see previous pages

There are various factors involved in the security of a variety of software applications, ranging from protected commerce payments, personal communications as well as defending passwords. One fundamental way for safe communications is cryptography. Cryptography is presently the main information and data security technology. However it is significant to note that as cryptography is essential for safe communications, it is not by itself sufficient. This research presents a detailed analysis of the cryptography technology in terms of information and data safety.

In this research I will present the comprehensive overview of the main security and privacy aspects those we need to assess during the implementation of any security policy. The technology of cryptography is very old but its utilization in the information technology sector was seen after the emergence of web based crimes. The research will spotlight on the main cryptographic technology, types, algorithms, application areas, main advantages, and some of the main technological scenarios. Introduction Data is the most important element of the firms for the reason that they heavily rely on this data to run and manage their business tasks.

Basically, data can be defined “as the “group of unrefined facts representing events taking place in organizations or the physical environment prior to they have been structured and managed into a structure that people can identify and utilize and Information refers to data that have been transformed into a structure that is important and functional to human beings” (Laudon & Laudon, 1999, p.7; Norton, 2001, p.4). Without a doubt, both the data and information are believed to be the main assets of almost all the business organizations.

In this scenario, it is essential for the business organizations to protect these assets from possible threats. According to (Laudon & Laudon, 1999, p. 502), “security is a set of rules, actions, and technical measures used to stop unlawful access or modification, robbery, and physical damage to the database. Privacy refers to the right of individuals and organizations to forbid or restrict the compilation and utilizations of information about them.” In the past, information privacy was uncomplicated to retain for the reason that information was kept in different locations.

Each business had its own acknowledgment files. Each government agency kept detached records. Doctors kept their own patient files. On the other hand, at present, massive databases store this data online. A large amount of this data is private and secret and should be reachable only to approved users (Shelly, Cashman, & Vermaat, 2005, p. 591). In this situation the data security becomes a big challenge which demands implementation of effective methods. Cryptography provides useful techniques for security of data and information.

Technology of Cryptography can be described as the science which deals with the processes of alteration of information or data into a scrambled code that can be decoded and sent all through a private or public network (Akdeniz, 1996; Kessler, 2009). Anonymity and Privacy In their research article (Martin, 2006) discuss that both the privacy and anonymity on the web are noteworthy because they are hard to attain. Online privacy concerns are in the news each day currently.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cryptography & Coding Essay Example | Topics and Well Written Essays - 3500 words”, n.d.)
Retrieved from https://studentshare.org/mathematics/1404330-cryptography-coding
(Cryptography & Coding Essay Example | Topics and Well Written Essays - 3500 Words)
https://studentshare.org/mathematics/1404330-cryptography-coding.
“Cryptography & Coding Essay Example | Topics and Well Written Essays - 3500 Words”, n.d. https://studentshare.org/mathematics/1404330-cryptography-coding.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cryptography & Coding

Information Theory and Cryptography

It will also examine how these two concepts fare within the ambit of a popular coding algorithm – the Huffman coding system.... This essay "Information Theory and cryptography" confines itself to just two concepts within cryptography – entropy and unicity distance – that it will treat at some length.... and cryptography.... cryptography is the art (or rather science) of writing in secret code and dates back to the ancient Egyptians (Kessler, Gary C....
9 Pages (2250 words) Essay

The Uses of Basic Cryptography in My Organization

summarize the uses of basic cryptography in your organization.... cryptography is used for the protection of all data stored on the organisation's networks and servers.... As explained by Juels (2003) cryptography involves the encryption of data or their rendition into secret, indecipherable code, for the explicit prevention of their interpretation and use if they are accessed without the proper authorization....
4 Pages (1000 words) Essay

Encryption Keys Used to Ensure Secure Communication Sessions

They are encryption keys used to ensure secured communication sessions between agencies or connected computers.... They are commonly used by communicating parties for transport connections.... For the… These encryption techniques are categorized into public key encryption and single key encryption....
3 Pages (750 words) Essay

Differentiate between the different types of cryptographic algorithms

Encryption is the process of coding information inform of cipher text for protection of information.... Encryption is the process of coding information inform of cipher text for protection of information.... In cryptography, a key refers to a… There are various forms of classifying Cryptographic algorithms.... In cryptography, a key refers to a sequence of bits which long and used in decryption or encryption algorithms....
1 Pages (250 words) Essay

Cryptology Advancing National Security

This essay analyzes cryptography, that plays an important role in securing the defense of the nation with its ability to create secure network and communication channels for the government and the military.... It is clear that cryptography plays a very integral role not only in securing sensitive government information....
7 Pages (1750 words) Essay

Cryptography as One Fundamental Way of Saving Communications: Information and Data Security Technology

Through cautious planning of the operations of the cryptographic procedures and coding, these intimidations can be diminished.... The paper describes the detailed analysis of the cryptography technology regarding information and data safety.... hellip; The technology of cryptography is very old but its utilization in the information technology sector was stated after the emergence of web-based crimes.... The research will spotlight on the main cryptography technology, types, algorithms, application areas, main advantages, and some of the main technological scenarios....
18 Pages (4500 words) Research Paper

The Future of the Internet

In general, he recommends further expansion and understanding of the concepts of cryptography, coding, and safer operations and exchange.... This review "The Future of the Internet" is focused on the computer and digital technologies that have our life encircled in every way possible....
8 Pages (2000 words) Book Report/Review

Cryptographic Protocols

This report "Cryptographic Protocols" discusses cryptography as a must-have for organizations and individuals, otherwise much of the private, confidential, and core business and personal information will be stolen and used against the rightful owners.... In a public office for instance, where PCs are shared by a number of people, through the same network connections, public-key cryptography is advisable such that many individuals may know the common key to the shared PCs but each individual further accesses private keys to his/ her messages for decryption; this format is known as asymmetrical key encryption scheme....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us