Preview

6th Sense Technology

Good Essays
Open Document
Open Document
951 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
6th Sense Technology
Cryptography History * Dates Back to Julius Ceaser * Didn’t trust messanger * Used “Shift by 3” method
Cryptography Basics * Cryptosystem (Cipher System) – method of disguising messages so that only certain people can read them * Cryptography – Art of creating and using Cryptosystems * Cryptanalysis – Art of breaking Cryptosystems * Cryptography – study of Cryptography and Cryptosystems * Symmetric Cryptosystems use the same key to encrypt and decrypt * You need to send the key securely * Asymmetric Cryptosystems use a public key to encrypt and a private key to decrypt
RSA Encryption * Invented in 1978 by Ron Rivest, Adi Shamir and Leonard Adleman * Algorithm for public key encryption
RSA Encryption Algorithm * 1. Find P and Q two large prime numbers * 2. Choose E such that: 1<E<PQ * E does not have to be prime, but must be odd * (P-1)(Q-1) and E must not have no prime factors in common * 3. Compute D such that (DE-1) is evenly divisible by (P-1)(Q-1) * 4. Encryption function is C = (T^E) mod PQ * C is the ciphertext (positive integer) * T is the plaintext (positive integer) * T must be less then the modulus PQ * 5. Decryption function is T = (C^D) mod PQ * C is the ciphertext (positive integer) * T is the plaintext (positive integer) * D is the private key RSA Encryption * Relying on * No one can solve * Would take to long to solve * Theoretically Can be Broken
Quantum Cryptography History * Early 1970’s Stephen Wiesner wrote “Conjugate Coding” * 1979 Charles H. Bennett and Gilles Brassard wrote various papers on the subject * Basis: Takes advantage of Heisenberg’s principle in which measuring a quantum system disturbs it and yields incomplete information
Quantum Cryptography Setup * Most widely used is the BB84 Protocol developed by IBM * The sending apparatus consists

You May Also Find These Documents Helpful

  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    CSEC 630 Lab Assignment 1 – Introduction to Cryptography. (n.d.). University of Maryland University College. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Sensormatic Case Study

    • 1314 Words
    • 6 Pages

    Sensormatic manufactures, markets, and services theft detection devices and pioneered the merchandise security business. Its current manufacturing operations occur at Deerfield Beach plan between two separate departments of systems production and tag production. Sensormatic currently purchases polypropylene and ABS parts from Canon Plastics and Piedmont Plastics for its alligator, half alligator, and other tags. Now it is evaluating whether to make or buy plastic parts while at the same time considering the adoption of a radically new process technology to make 'throw away' tags that would simplify assembly and is expected to achieve mass production rates within 1 year.…

    • 1314 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Special Senses

    • 417 Words
    • 2 Pages

    Q.1. What is the distribution of rods and cones on the retina? What results did we observe from the visual field experiment that confirms this? In your response describe the data collected and correlate the data with the known distribution of rods and cones.(10 points)…

    • 417 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    RSA is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    He had found the basis of the…

    • 941 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Sensory Perception

    • 773 Words
    • 3 Pages

    The paper will discuss sensory perception that asks the question can you really trust your senses and the interpretation of sensory data to give you an accurate view of the world. What are the accuracy and the weaknesses of the human senses as they pertain to thinking in general and to your own thinking in particular?…

    • 773 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Public Key Encryption: PKI Public Key Encryption technique to bind information through public key and provide data encryption and encryption. (What is PKI, comodo.com)…

    • 601 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Sensory Perception

    • 1062 Words
    • 5 Pages

    Kirby, G. R. & Goodpaster, J. R. (2007). Thinking (4th ed.). Upper Saddle River, NJ:…

    • 1062 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Since the dawn of the first computers made available to the masses, our society as a whole, as well as the way we interact with the world, has been changing and accommodating in order to include these technological advances in our daily lives. These advances in technology have been changing our society in many ways, and while there are countless benefits that these innovations have brought to all fields be it social, medical, educational, or recreational, there are people who fear that these technologies are having a negative impact on our lives by creating a divide in our reality. The two sides of this division are between the physical world and the digital world, the physical world being what we interact with daily outside of technology and the digital world being that which we interact with when we use the internet, computers, phones and other electronic devices. However with this in mind many people involved in creating technological innovations have been coming up with ideas that allow us to interact with technology through more physical means of input rather than point click and the use of a keyboard, These new growing methods of input include voice and touch capabilities. These innovations are the building blocks in linking the gap between the physical and digital world. One recent development that has the capability of implementing a way society can interact with both the world of information and physical world is the “SixthSense” project.…

    • 1278 Words
    • 6 Pages
    Better Essays

Related Topics