Thursday, March 21, 2019

Cryptography Essay -- Data Encryption

coding is such a broad social function of our lives we do not even notice the smallest applications, shopping on eBay or watching satellite television. I bet you even used cryptanalytics when you were in school and did not even know it. Ever import a message in add togethers instead of earns? individually letter of the alphabet correlated to its number position in the alphabet. The number sequence 3,16,25,12,20,15,12,15,7,25 equals cryptology. This is a form of cryptology in its most grassroots form. Websters dictionary defines Cryptography as n.1.The act or art of report in code or secret characters also, secret characters, codes or nixs, or messages written in a secret code.2.The science which studies methods for encoding messages so that they can be read only by a soul who knows the secret information required for decoding, called the key it includes cryptanalysis, the science of decoding encrypted messages without possessing the straight-laced key, and has several ot her branches see for example steganography. 1Cryptographies main purpose is to mist messages and information. One of the earliest forms of cryptography was the rearranging of letters in messages. This was known as transportation ciphers. A cipher is a system in which intelligible text, usually the letters, are transposed or substituted according to a predetermined code. Another early form of cryptography was the substitution of letters. One cipher was named after Julius Caesar who was said to have used a 3 letter shift. This involved substituting a letter with another letter in the alphabet three positions away. Caesar used this method to communicate with his generals in wartimes. 2 Cryptography tries to protect the confidential nature in the communications of military leading ... ...to keep secret.References1. http//www.webster-dictionary.net/d.aspx?w=Cryptography2. http//en.wikipedia.org/wiki/Cryptography3.Eerdmans Commentary on the Bible, pile D G Dunn, John W Rogerson, ed s., Wm. B. Eerdmans Publishing, 2003, ISBN 0-8028-3711-54.Kama Sutra, Sir Richard F. Burton, translator, Part I, Chapter III, 44th and forty-fifth arts.5.David Kahn, The Codebreakers, 1967, ISBN 0-684-83130-9.6.http//www.cnn.com/SPECIALS/2001/nsa/stories/crypto.history/7.Whitfield Diffie and Martin Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp 644-654.8.http//www.webopedia.com/ frontier/S/SSL.html9.http//computing-dictionary.thefreedictionary.com/TCP%2FIP+port 10.http//news.com.com/FAQ+Sonys+rootkit+CDs/2100-1029_3-5946760.html?tag=nl11.http//www.rsasecurity.com/node.asp?id=1158

No comments:

Post a Comment