.

Friday, February 8, 2019

Cryptography Essay -- Data Encryption

cryptanalysis is such a broad opus of our lives we do not even notice the smallest applications, shopping on eBay or watching satellite television. I bet you even used cryptology when you were in school and did not even know it. Ever economize a message in considers instead of garners? each(prenominal) letter of the alphabet correlated to its number position in the alphabet. The number sequence 3,16,25,12,20,15,12,15,7,25 equals cryptology. This is a form of cryptology in its most sanctioned form. Websters dictionary defines Cryptography as n.1.The act or art of piece of music in code or secret characters also, secret characters, codes or bets, or messages written in a secret code.2.The science which studies methods for encoding messages so that they can be read only by a mortal who knows the secret information required for decoding, called the key it includes cryptanalysis, the science of decoding encrypted messages without possessing the fit key, and has several other b ranches see for example steganography. 1Cryptographies main purpose is to screen messages and information. One of the earliest forms of cryptography was the rearranging of letters in messages. This was known as transportation ciphers. A cipher is a system in which bleak text, usually the letters, are transposed or substituted according to a predetermined code. Another early form of cryptography was the substitution of letters. One cipher was named after Julius Caesar who was said to have used a 3 letter shift. This involved substituting a letter with another letter in the alphabet three positions away. Caesar used this method to communicate with his generals in wartimes. 2 Cryptography tries to protect the confidential nature in the communications of military leadership ... ...to keep secret.References1. http//www.webster-dictionary.net/d.aspx?w=Cryptography2. http//en.wikipedia.org/wiki/Cryptography3.Eerdmans Commentary on the Bible, pile D G Dunn, John W Rogerson, eds., Wm. B. Eerdmans Publishing, 2003, ISBN 0-8028-3711-54.Kama Sutra, Sir Richard F. Burton, translator, Part I, Chapter III, 44th and forty-fifth arts.5.David Kahn, The Codebreakers, 1967, ISBN 0-684-83130-9.6.http//www.cnn.com/SPECIALS/2001/nsa/stories/crypto.history/7.Whitfield Diffie and Martin Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp 644-654.8.http//www.webopedia.com/ marches/S/SSL.html9.http//computing-dictionary.thefreedictionary.com/TCP%2FIP+port 10.http//news.com.com/FAQ+Sonys+rootkit+CDs/2100-1029_3-5946760.html?tag=nl11.http//www.rsasecurity.com/node.asp?id=1158

No comments:

Post a Comment