This website uses cookies to ensure you have the best experience. Learn more

Cryptography Essay

2021 words - 9 pages

Cryptography is such a broad part of our lives we do not even notice the smallest applications, shopping on eBay or watching satellite television. I bet you even used cryptology when you were in school and did not even know it. Ever write a message in numbers instead of letters? Each letter of the alphabet correlated to its number position in the alphabet. The number sequence 3,16,25,12,20,15,12,15,7,25 equals cryptology. This is a form of cryptology in its most basic form. Webster's dictionary defines Cryptography as :
n. 1. The act or art of writing in code or secret characters; also, secret characters, codes or ciphers, or messages written in a secret code.
2. The science which ...view middle of the document...

One of Nero's policies was the persecution of Christians.[3] Lovers are instructed to use cryptography to communicate without being discovered in the Kama Sutra. [4]
Information in original form is called plaintext, the encrypted form is called ciphertext. Texts encrypted by classical ciphers reveal numeric information about the message, which can be used to break the cipher. A classical cipher is a cipher that uses an alphabet of letters and usually is implemented by hand or simple machine. Classical ciphers are no longer used due their simple nature. With the discovery of frequency analysis (around the 10th century), by the Arabs, just about all ciphers of this kind became vulnerable by a fellow cryptographer. Frequency Analysis is based on the commonality of letters in a given language such as ‘st' and ‘th' in the English language. An example would be the letter e is used quite often versus the letter x is rarely used.
A basic understanding of the statistics of the plaintext language and some problem solving skills including patience when done by hand are all that is required. These types of ciphers are still used today mostly in puzzles. Practically all ciphers remained vulnerable to this type of attack until Leon Battista Alberti invented the polyalphabetic cipher around the year 1467. His innovation used different ciphers for varying parts of a message. He invented the first automatic cipher device, a wheel which switch alphabets after several words. The polyalphabetic Vigenère cipher uses a key word in controlling letter substitution based on which letter of the key word is used. [2] Though an improvement, ciphers were still partially vulnerable to frequency analysis techniques. This was discovered in the mid 1800s by Charles Babbage.[5]
Modern uses of cryptology date back to World War I. The US was helping the British capture and decipher messages from Germany. At this point in the war the US had remained neutral. Then a telegram was intercepted (The Zimmermann telegram) from Germany to Mexico. Basically what it said was that Germany would divide up the US with Mexico if they would help in the war effort. The US ended its position of neutrality soon after. [6]
In World War II, there were many uses of cryptology. The infamous Enigma machine used by the German military was one of the more famous ones. This was an electro-mechanical, portable cipher machine. It was able to encrypt and decrypt messages. The Enigma machine was a combination of keys, plugs and rotors creating a complex mechanical machine. The Enigma was first commercial available in the 1920's. Governments and military of many nations adopted this type of cryptography. A British mathematician, Alan Turing, was able to crack the code which helped in the Allied victory. The US was also successful in breaking many of the Japanese codes too. This lead to a win at Midway Island, turning the war in the Pacific. Another message that was intercepted lead to the death of...

Other Essays Like Cryptography

Public-Key Cryptography Essay

950 words - 4 pages Information Security overview for Managers and policy Makers ITM517 Module 5 Case Study Public-key cryptography March 6th, 2013 Introduction Cryptography is the study of protecting information through the use of codes and ciphers. Cryptography forms a fundamental part of message security. At its simplest form, is a process of methodically changing information to make it unreadable without knowing how that information was changed. One of

Modern Cryptography Research Paper

1553 words - 7 pages CS 6903 - Applied Cryptography Lecture 10: Lecture 10, slides 3-15 Speaker: Giovanni Di Crescenzo, Scribe: Chaitanya Bhorade December 13, 2014 Summary: This document contains notes for Lecture 10, slides 3-15. These are the lecture notes with some additional information by the scribe, for Lecture 10 Slides 3- 15. The primary focus is on Digital Signatures and its constructions. Properties of a digital signature is then discussed. This is

Full Time

1771 words - 8 pages Quantum Computers & Quantum Cryptography Innovations in IT Mayi UmBayemake Health Informatics 500 May 17, 2015 Abstract This research pertains to Quantum Computers and Cryptography. These topics have emerged greatly in the past few years, are proven to be very important and useful to businesses. The use of quantum computers and cryptography will be able to offer faster processing of information and security. Quantum computers are


605 words - 3 pages Cryptography Cryptography is an algorithm used for secure communication in the presence of third parties through encryption and decryption. It is a common method which enables users to store private or sensitive information transmits across an insecure network, like internet. In this case, it is suggested to use for protecting and guarding the UPS official website information transaction of the between UPS and its customers. In


3265 words - 14 pages way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that

Mod 7 Essay Questions

1476 words - 6 pages are unknown and unpredictable by adversaries. The importance of random key generation is it will ensure the key could not be guess or just figured out. 4. Answer. There are two basic types of cryptographic keys: secret key, and public key. The combined use of secret and public key cryptography efficiently underwrites all the authentication, integrity, and secrecy services necessary for most users. The difference between the two is that in

Security Protocols

1624 words - 7 pages  model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography by utilizing asymmetric key cryptography during certain phases of authentication. Kerberos uses port 88 by default. MIT developed

Is4550 Lab 9

632 words - 3 pages . Threat Assessment and Management Policy 8. Which policy definitions reference a Data Classification Standard and use of cryptography for confidentiality purposes? a. Asset Management Policy 9. Which policy definition from the sample IT security policy framework definition mitigate risk in thee User Domain? a. Security Awareness Training Policy 10. Which Policy definition from the sample IT security policy framework definition mitigates risk in

Telecommunications Reform

3164 words - 13 pages Union needed an export license. This regulation was in place in order to prevent reverse engineering of American products. This applies to the American communications industry because tight controls are kept over cryptography products in order to prevent them from being sold to nations who In turn might use our strong encryption protocols against the United States. However, regulation has recently fallen out of favor with much of the developed

Motion Vector

2583 words - 11 pages message and the cover data are only the means of sending it. Secret information as well as cover data can be any multimedia data like text, image, audio, video etc The objective of this work is to develop a Compressed Video Steganographic Scheme that can provide provable security with high computing speed, that embed secret messages into images without producing noticeable changes. Here we are embedding data in video frames. Cryptography

Quantum Quandaries

1626 words - 7 pages . Alain Aspect, a French physicist, later violated the proof in the strongest test done thus far. This confirmed that nonlocal effects do exist. This led Charles Bennett and Gilles Brassard to come up with an idea for quantum cryptography in 1984. It would use a photon’s state changes to make an encrypted key. Six years later, Bennett reported the first test model for key distribution using quantum mechanics. Bennett later proposed that the

Related Papers

Cryptography Essay

572 words - 3 pages Symmetric Cryptography Secret writings have been found in many civilizations dating back to thousands of years where wide spread writings were adopted. Some of these civilizations included the Egyptians with their use of hieroglyphics, the Greeks and Spartan and the use of Scytale, and the Romans with the use of the Caesar Cipher. All these encryption methods could be thought of as symmetric encryption, which uses the same key to encrypt and

Quantum Cryptography Essay

1002 words - 5 pages Quantum Cryptography Keeping secrets and passing information that is undetected has long been the goal of cryptographers. Codes have been written and then broken keeping cryptographers in constant search for the unbreakable code. Until recently, that goal seemed unreachable; however, a solution to the once impossible question seems to have surfaced. Quantum cryptography delves down into the world of very small particles, where there are

Quantum Cryptography Essay

5279 words - 22 pages Quantum Computing and Quantum Cryptography What do they mean for traditional cryptography? Tim Moses Director, Advanced Security Technology Robert Zuccherato Chief Cryptographer January 13, 2005 Version 1.1 © Copyright 2005 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust

Cryptography & Online Bankcard Transactions Essay

1796 words - 8 pages CRYPTOGRAPHY & ONLINE BANKCARD TRANSACTIONS Keller Graduate School of Management SE577ON_A – Cryptography and Security Mechanisms NOV10 Alicia Franklin Cryptography for an Extranet Table of Contents I. Online Banking Overview ………………………………………………3 II. Security Threats to Businesses…………………………………………..3 III. Cross Site Attacks ………...…………………………………………….4 IV. Mitigating Cross Site Attacks ………………………………………….5 V. Phishing