Thursday, May 30, 2019

Cryptography Essay -- Data Encryption

Cryptography is such a broad part of our lives we do not even get hold the smallest applications, shopping on eBay or watching satellite television. I bet you even used cryptology when you were in school and did not even have it away it. Ever write a message in numbers instead of letters? Each letter of the alphabet correlated to its number position in the alphabet. The number sequence 3,16,25,12,20,15,12,15,7,25 equals cryptology. This is a form of cryptology in its most basic form. Websters dictionary defines Cryptography as n.1.The act or art of write in code or secret characters also, secret characters, codes or works, or messages written in a secret code.2.The science which studies methods for encoding messages so that they john be read only by a person who knows the secret information required for decoding, called the key it includes cryptanalysis, the science of decoding encrypted messages without possessing the proper key, and has several early(a) branches see for exam ple steganography. 1Cryptographies main purpose is to hide messages and information. One of the earliest forms of cryptology was the rearranging of letters in messages. This was known as transportation ciphers. A cipher is a system in which plain text, usually the letters, are transposed or substituted according to a predetermined code. Another early form of cryptography was the substitution of letters. One cipher was named after Julius Caesar who was said to have used a 3 letter shift. This involved substituting a letter with another(prenominal) letter in the alphabet three positions away. Caesar used this method to communicate with his generals in wartimes. 2 Cryptography tries to protect the confidential nature in the communications of forces leaders ... ...to keep secret.References1. http//www.webster-dictionary.net/d.aspx?w=Cryptography2. http//en.wikipedia.org/wiki/Cryptography3.Eerdmans Commentary on the Bible, James D G Dunn, John W Rogerson, eds., Wm. B. Eerdmans Publish ing, 2003, ISBN 0-8028-3711-54.Kama Sutra, Sir Richard F. Burton, translator, Part I, Chapter III, 44th and forty-fifth arts.5.David Kahn, The Codebreakers, 1967, ISBN 0-684-83130-9.6.http//www.cnn.com/SPECIALS/2001/nsa/stories/crypto.history/7.Whitfield Diffie and Martin Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp 644-654.8.http//www.webopedia.com/TERM/S/SSL.html9.http//computing-dictionary.thefreedictionary.com/TCP%2FIP+port 10.http//news.com.com/FAQ+Sonys+rootkit+CDs/2100-1029_3-5946760.html?tag=nl11.http//www.rsasecurity.com/node.asp?id=1158

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.