Nobody downloaded yet

Information Theory and Cryptography - Essay Example

Comments (0) Cite this document
Summary
Information theory can be defined as the mathematical aspect of processing data so that it can be communicated across different media. Such data processing can be compression of computer files, error-correcting codes such as those used in DVD players, digital television, etc…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Information Theory and Cryptography
Read TextPreview

Extract of sample
"Information Theory and Cryptography"

Download file to see previous pages In the present context, with the advent of computers in every aspect of daily routines of individuals and organizations in the 21st century, large amounts of information have to stored in or transmitted through unsafe media. It becomes essential that such information is not accessible to those who are not privy to it. Thus, to this effect of lending exclusivity to information stored or transmitted, the science of cryptography today has pervaded all areas of information technology today.
Towards these ends three types of cryptographic schemes are generally used today. The algorithms utilized in these schemes are described by the number of keys used to encrypt and decrypt data and additionally by their applications.
Public Key Cryptography (PKC) - These are asymmetric algorithms that use two keys - one key to encrypt and another to decrypt. One key is called the public key which may be advertised to all and sundry while the other is called the private key and this is only available to privy entities. It does not matter which key is used to encrypt or decrypt but the end-effect is the encryption allows the information to remain exclusive.
Hash Function (One-Way Cryptography) - These algorithms have no key and they allow the plaintext to be encrypted once into ciphertext that is not recoverable. These algorithms are usually used to provide a digital fingerprint of data and act as proof that the data has not been altered by unauthorized entities including viruses. Often, these algorithms that primarily prove the integrity of the information encrypt passwords. (Kessler, Gary C., 1998)
It should be noted that the above schema have been treated rudimentarily. There are numerous examples of each type of algorithm that are being used regularly in the information technology world but these too have been kept beyond the purview of this paper.
Special Significance
Cryptography also serves some security requirements specific to application-to-application communications in the information technology world.
It serves to authenticate the users' identity. It should be noted in this context that the most widely used network in use today in the world - the Internet - has very weak host-to-host authentication in the forms of name or address based identity.
It serves to maintain privacy and confidentiality by ensuring that only intended users have access to the relevant information. Both the sender and the receiver are reassured of these.
It serves to non-repudiate - it authenticates that the sender really sent the message. (Kessler, Gary C., 1998)
Cryptography is such a vast science today that if this paper was to treat to any extent all the concepts inherent within it this paper would take the semblance of a mere glossary of terms. Thus, to avoid such low ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Theory and Cryptography Essay Example | Topics and Well Written Essays - 2750 words”, n.d.)
Information Theory and Cryptography Essay Example | Topics and Well Written Essays - 2750 words. Retrieved from https://studentshare.org/technology/1522684-information-theory-and-cryptography
(Information Theory and Cryptography Essay Example | Topics and Well Written Essays - 2750 Words)
Information Theory and Cryptography Essay Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/technology/1522684-information-theory-and-cryptography.
“Information Theory and Cryptography Essay Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/technology/1522684-information-theory-and-cryptography.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Cryptography & Coding
...to be beaten, that is, one that is totally protected against being compromised devoid of information on the transmitter or the receiver of the data and information messages. The word quantum describes the basic behavior of the negligible elements of matter as well as energy: quantum theory clarifies all that exists as well as nothing can be in contravention of it (Pawliw B. , 2004). The technique of quantum cryptography is not similar to traditional cryptographic methods because it uses principles of physics, instead of mathematics. Fundamentally, quantum cryptography is foundational on the practice of individual atoms/waves of light and their essential...
14 Pages(3500 words)Essay
Public-key cryptography and information security
...?PUBLIC-KEY CRYPTOGRAPHY AND INFORMATION SECURITY Public-Key cryptography and Information Security Affiliation Public Key Cryptography (PKC) uses a key with two elements, a "public key" and a "private key", for the implementation of an encryption algorithm that doesn't require two parties (sender and receiver) to first exchange a secret key in an attempt to carry out the process of communication. In this scenario, the public key part is used for encryption entirely at the receiver side, whose private key part is applied for decryption. However, in order to make this communication safe it is necessary to make sure that only the intended receiver is able to...
2 Pages(500 words)Essay
IT - Attacking Cryptography
...? Full Paper Table of Contents Attacking Cryptography …………………………………… Page 3- 6 Conclusion …………………………………… Page 6-7 References …………………………………… Page 7 Glossary of Terms …………………………………… Page 8 Attacking Cryptography The reason for using an open source operating systems is to customize and select appropriate technology that was set to default. In this rapidly changing digital world of advanced hackers, new prevention techniques are invented for maximum prevention along with minimizing risks. One cannot predict that the blowfish encryption algorithm will also be replaced by the new and more secure algorithm known as (Anonymous2007, 500-500) two fish that will also be replaced at some period of this...
5 Pages(1250 words)Essay
Cryptography
...Error correction is an important concept in cryptography and computer science. They are used in various solutions in computer science. This paper will look at the application of fuzzy error correction in the field of communications. The main intention of an error correcting code is to allow a message to be transmitted in an intact manner over a channel which is noisy and still maintain a good state. This process is achieved by having a mapping of m to a string, c, which is longer than m, before transmission. The construction of c is done in such a way that there are elements which are redundant in it. This will, therefore, enable the receiver to reconstruct c even if some bits of c are corrupted by noise; the receiver...
4 Pages(1000 words)Research Paper
Cryptography Attacks
...?Cryptography Attacks Cryptography is a science of communication that specializes in secure communication in the presence of a third party commonly referred to as adversaries. According to the Oxford English dictionary, an adversary is an enemy or a person who poses an amount of risk to others. Cryptography is a science of secure communication using unique codes to disguise the information thereby making it inaccessible by third parties. Presumably, the American government has a several enemies all of which will do anything to access some of the information in the government databases (Oded, 2001). This is further compounded by the constant need for government agencies to share information over the common means of communication... that...
5 Pages(1250 words)Research Paper
Cryptography
...? Full Paper Table of Contents Cryptography …………………………………… Page 3- 6 Conclusion …………………………………… Page 6-7 References …………………………………… Page 7 Glossary of Terms …………………………………… Page 8 Cryptography Secure Socket Layer v3 The reason for using an open source operating systems is to customize and select appropriate technology that was set to default. In this rapidly changing digital world of advanced hackers, new prevention techniques are invented for maximum prevention along with minimizing risks. One cannot predict that the blowfish encryption algorithm will also be replaced by the new and more secure algorithm known as (Anonymous2007, 500-500) two fish that will also be replaced at some period of this...
4 Pages(1000 words)Research Paper
Cryptography
...summarize the uses of basic cryptography in your organization. You will want to find out such things as whether you use checksums, disk encryption, VPNs (virtual private networks), link encryption and SSL for your Web site. Find out who's responsible for these tools Information and Computer Technology has facilitated countless aspects of the business process and has automated numerous work tasks. Its adoption by organisations and its subsequent integration into the business process have proven invaluable. At the same time, however, it has led to countless security issues and, as a rule of thumb, has imposed the imperatives of adopting cryptographic techniques and technologies by organisations who engage...
4 Pages(1000 words)Essay
Cryptography Application Methods
...widespread. This age of information has witnessed the emergence of cryptography a major protection method of applications. This paper will investigate some of the application methods of cryptography together with the systems application in a college university. In a university setup, cryptography has applications in ensuring secrecy in storage, integrity in transmission, authentication of identity and integrity in storage. Secrecy in storage The maintenance of the secrecy in storage requires a one key system whereby the user is responsible for the provision of the computer key at the start of the session. After this, the computer takes care of the decryption and...
2 Pages(500 words)Research Paper
Understanding Cryptography
...Understanding Cryptography. Number: Lecturer: Introduction. Internet communication, wireless networking, mobile computing, and cloud computing are some of the trends shaping the computing and communication industry. All organizations are embracing such new technologies in a bid to enhance their performance and gain a competitive edge. These technologies help the companies to achieve great milestones in data processing and communication (Cisco Inc., 2014). However, they have a great concern with regard to information and data security. This is where cryptography is used to secure and enhance security of data and information in the communication and wireless networks. Cryptography is somehow omnipresent going beyond the conventional... that...
4 Pages(1000 words)Essay
Quantum Cryptography
.... 4, pp. 686–689, viewed 24 January 2015, http://www.nature.com/nphoton/journal/v4/n10/full/nphoton.2010.214.html Nano 2014, Vulnerability in commercial quantum cryptography, Norwegian University of Science and Technology, viewed 24 January 2015, http://nanomagazine.co.uk/index.php?option=com_content&view=article&id=1011%3A vulnerability-in-commercial-quantum-cryptography&Itemid=159 Rothke B, 2007, ‘An Overview of Quantum CryptographyInformation Security Management Handbook, Sixth Edition, pp. 1045–1057, viewed 24 January 2015, http://www.infosectoday.com/Understanding_Cryptography/Articles/Quantum_Cryptogr aphy.pdf... Running Head: QUANTUM CRYPTOGRAPHY QUANTUM CRYPTOGRAPHY By Quantum...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Information Theory and Cryptography for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us