logo

Cryptographic Techniques Assignment Solution

6 Pages1264 Words132 Views
   

Added on  2021-06-17

Cryptographic Techniques Assignment Solution

   Added on 2021-06-17

ShareRelated Documents
Cryptographic techniquesStudent’s nameInstitution Affiliation(s)
Cryptographic Techniques Assignment Solution_1
Cryptography and Computer SecurityIntroductionSecurity in the general context refers to protect anything from getting stolen or damaged. Likewise, computer security relates to the security and protection of the computer data and information(ITL Education Solutions, 2012). The first example of computer security can be seenwhen the computerized switchboard was introduced to protect hardware from external damage in1976. Then protection was developed to safeguard remote computing, and this was done by establishing the modem. In the 1980’s another problem arose when personal computers were designed, this also brought an introduction to the internal issues, i.e., virus from which the PC needed protection. Matters continued to emerge, but the most severe problem came with the introduction of the internet. Internet gave rise to many questions because the internet gave rise tomany virtual access points. Access points are an entrance to every sort of information and along with the information that enters virus and other malware can easily join(Stinson, 2016). This opened a gateway to many virus and unwanted material into the computer. To protect the network from such threats many techniques and methods were adopted, and up till now new techniques and soft wares are being developed to protect the system. One such way of protecting data is cryptography. It was used to convert readable data into data that cannot be understood. In the earlier years cryptography was used to protect and secure information and messages between essential personnel, but gradually encryption began to be used for the protection and safety of all sorts of communication and safe computing(Stinson, 2016).
Cryptographic Techniques Assignment Solution_2
CryptographyCryptography has generally been used widely, and there are some keys that are written for the public, and the primary reason is to protect the data that is being transferred that is why it usuallyremains a secret or a matter of confidentiality between the receiver and the sender. It is a matter of great concern for the government and especially the law enforcing agencies when the data is encrypted as they need to be better equipped with programs and software to be counter the encrypted data and be able to read it(Anderson & Rane, 2017). This is the sole reason that previously there was such a hue and cry with relations to the matter of privacy. It was discoveredthat no mail or communication was hidden from them. They had super software and supercomputers to help them decode the algorithms and be able to decipher it.Cryptography is the process of transforming a text that is apparently into the incomprehensible format. Business enterprises predominantly use encryption during their storage and transmission of messages carefully for reading by the intended recipients(Buchanan, 2017). Cryptography hasseveral applications and methods. In the past, it was used in assuring secrecy. The authenticity ofthe sender and integrity of the media were secured through the use signatures, wax, and other physical attributions. However, the introduction of electronic transfer transformed the use of cryptography into electronic cash. This led to the emergence of debit and credit cards whose applications have since become widespread. This age of information has witnessed the development of cryptography a significant protection method of applications(Dooley, 2013).
Cryptographic Techniques Assignment Solution_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Types of Computer Security Techniques
|14
|4116
|383

Public-Key Infrastructure (PKI) - Importance, Working, and Benefits
|10
|2275
|404

(Sample) The Onion Routing
|6
|1617
|106

Security in Computing: Electronic Espionage, Access Control, Encryption, Viruses, Web Security, and Network
|8
|1514
|266

Wireless Communication Protocols and Technologies Used in IoT
|5
|1730
|427

Information Technology Security
|13
|3820
|443