Cryptography Application Methods - Research Paper Example

Comments (0) Cite this document
Business enterprises predominantly use cryptography during their storage and transmission of messages carefully for reading by the intended recipients. Cryptography has several…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Cryptography Application Methods
Read TextPreview

Extract of sample "Cryptography Application Methods"

Cryptography Application Methods Cryptography Application Methods Cryptography is the process of transforming a text that is clearinto incomprehensible format. Business enterprises predominantly use cryptography during their storage and transmission of messages carefully for reading by the intended recipients. Cryptography has several applications and methods. In the past, it was used in assuring secrecy. The authenticity of the sender and integrity of the media were secured through the use signatures, wax, and other physical attributions. However, the introduction of electronic transfer transformed the use of cryptography into electronic cash. This led to the emergence of debit and credit cards whose applications have since become widespread. This age of information has witnessed the emergence of cryptography a major protection method of applications. This paper will investigate some of the application methods of cryptography together with the systems application in a college university. In a university setup, cryptography has applications in ensuring secrecy in storage, integrity in transmission, authentication of identity and integrity in storage.
Secrecy in storage
The maintenance of the secrecy in storage requires a one key system whereby the user is responsible for the provision of the computer key at the start of the session. After this, the computer takes care of the decryption and encryption during the entire course of its normal use. Indeed, there are numerous hardware devices for automatic encryption of personal computers of all the information that the disk stores. Upon turning on a computer, a user must provide the encryption hardware with a key. Otherwise, the information will be meaningless even in the event that the hard disk is stolen. However, secrecy in storage is not without problems. In an event that the user forgets the key, then the encryption information become unusable. Apparently, encryption only occurs while the information is in storage and not when it is in use.
Integrity in transmission
The electronic money transfer has the danger of invasion by criminals who can tap a system and make false transfers. However, to realize integrity in the transfer of funds, there is need to perform an information checksum before submitting it in the form of encryption. Upon the receipt of this encrypted information, another checksum takes place for comparison after decryption. An agreement of the checksum is an indication that an alteration had occurred to the message. Forging this kind of information is easy. Since a lot of publications and intellectual works occur in universities, integrity in the transmission of this kind of information can be of great help (Delfs & Knebl, 2007).
Credentialing systems
A credential is a document that references a trusted party while introducing one party to the other. It occurs through credentialing a claim by the use of electronic credentials. This helps in verifying information electronically. Today, a lot of information is being integrated into the systems of the smart card. For a university, the electronic credentials can be of great need in verifying information from its partners or within its ranks.
Electronic signatures
These are the modes of offering transactions involving two or more parties in a legally binding way. They are normally tricky to forge but easy to use (Martin, 2012). Besides, the law accepts them as binding. Electronic signatures come in handy when the business dealings are acute and the parties involved are located in different locations from each other. Most universities run exchange programs with their counterparts in far distance lands. In this way, electronic signatures can make the transactions involving programs easier.
Delfs, H., & Knebl, H. (2007). Introduction to Cryptography: Principles and Applications.
Berlin ; New York : Springer.
Martin, K. M. (2012). Everyday Cryptography: Fundamental Principles and Applications.
Oxford ; New York: Oxford University Press. Read More
Cite this document
  • APA
  • MLA
(“Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from
(Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 Words)
“Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cryptography Application Methods

Cryptography & Coding

...cryptography is the science of writing in covert code and is a very old art. The initial documented utilization of cryptography in scripting dates back to around 1900 B.C. This early utilization of the cryptography was done by an Egyptian scribe who utilized non standard hieroglyphs in writing (Kessler, 2009). A number of cryptographic methods are vulnerable to diverse shapes of web or network attack. An ideal encryption algorithm would simply be weak to brute force attacks that are cracks to try out each possible key. In the application of these encryption methods implementation errors and mathematical shortcuts can make it feasible to...
14 Pages(3500 words)Essay


...Error correction is an important concept in cryptography and computer science. They are used in various solutions in computer science. This paper will look at the application of fuzzy error correction in the field of communications. The main intention of an error correcting code is to allow a message to be transmitted in an intact manner over a channel which is noisy and still maintain a good state. This process is achieved by having a mapping of m to a string, c, which is longer than m, before transmission. The construction of c is done in such a way that there are elements which are redundant in it. This will, therefore, enable the receiver to reconstruct c even if some bits of c are corrupted by...
4 Pages(1000 words)Research Paper

Cryptography Attacks

...still to use such uncivilized methods of communication monitoring in the country. This causes discomfort to the users of the internet and the service providers such as Yahoo mail and the Google mail are bearing the implications while bearing financial losses, constant reminders that the government operates secretly stalking and breaching the privacy of the people it should protect (Oded, 2001). The internet further promises increased anonymity. Though the use of such applications as Google maps could reveal the presence of an individual, the internet does not reveal the user of the computer and or the place of use. This makes people say anything they feel like knowing that their safety and identity is...
5 Pages(1250 words)Research Paper


...? Full Paper Table of Contents Cryptography …………………………………… Page 3- 6 Conclusion …………………………………… Page 6-7 References …………………………………… Page 7 Glossary of Terms …………………………………… Page 8 Cryptography Secure Socket Layer v3 The reason for using an open source operating systems is to customize and select appropriate technology that was set to default. In this rapidly changing digital world of advanced hackers, new prevention techniques are invented for maximum prevention along with minimizing risks. One cannot predict that the blowfish encryption algorithm will also be replaced by the new and more secure algorithm known as (Anonymous2007, 500-500) two fish that will also be replaced at some period of this information...
4 Pages(1000 words)Research Paper


...summarize the uses of basic cryptography in your organization. You will want to find out such things as whether you use checksums, disk encryption, VPNs (virtual private networks), link encryption and SSL for your Web site. Find out who's responsible for these tools Information and Computer Technology has facilitated countless aspects of the business process and has automated numerous work tasks. Its adoption by organisations and its subsequent integration into the business process have proven invaluable. At the same time, however, it has led to countless security issues and, as a rule of thumb, has imposed the imperatives of adopting cryptographic techniques and technologies by organisations who engage in any form of...
4 Pages(1000 words)Essay

Methodology: theory, methods and application

...Research. Consequently two Action research studies have been employed to help determine what factors affect the use, application and any comparable differences in the real world of research. This research assignment is also designed to serve as a catalyst for increasing my own ontological, constructivist epistemological dispositional body of knowledge. 2. Paradigmas Academics (Researchers) or people interested in the field of research have several taxonomic methodological choices to construct valid research findings (Stanhouse, 1981) for their research. Strictly speaking, the world of research is divided into three main epistemological categories. Therefore, depending on the individual researchers ontological standing or...
10 Pages(2500 words)Coursework

Understanding Cryptography

...that protect against the influence of third parties in communication and networking. It also analyzes protocols and mechanisms that are related to information security aspects including data integrity, confidentiality, non-repudiation and authentication (Paar & Pelzl, 2010). Over the years, various techniques similar to encryption have been used as cryptography. However, modern cryptography borrows from disciplines of computer science, mathematics and electrical engineering among others. Cryptography is predominantly used in computer passwords, e-commerce, and ATM cards. It employs several tools and techniques to implement the security needed for the various applications...
4 Pages(1000 words)Essay

Quantum Cryptography

...of quantum cryptography in terms of security. This strong point occurs from every new QKD term code being free of all formerly used codes as this independence lowers the number of methods a criminal can infiltrate the system (Cobourne and Cid, 2011, p. 5). A fourth strength is the future proofing of security offered by QKD. Even when a malefactor breaks through a cryptographic system at any indefinite period in the future, former messages conveyed through it stay secure (Cobourne and Cid, 2011, p. 5). Mathematics has demonstrated the absolute security of QKD networks. Even when dealing with a rival that has endless supplies of time and energy, security of QKD networks are unbreakable. One weakness of...
2 Pages(500 words)Essay

Application: Methods Section (Part 2

...Application: Methods Section-Part 2 s: Affiliation: Application: Methods Section Part 2 Variables that predict job attitudes There are several factors or variables that tend to predict negative attitudes towards work. Some of these variables are feeling unappreciated, lack of accountability and engrained culture also referred to as old culture. These factors characterize a typical work setting and can affect the efficiency and productivity of work if not addressed in due course. Justification of Variables Feeling Unappreciated When workers feel unappreciated through underpayment by the management, they tend to develop a negative perspective of the company leading to...
8 Pages(2000 words)Statistics Project
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Cryptography Application Methods for FREE!

Contact Us