Preview

Cryptology and Cipher Codes

Better Essays
Open Document
Open Document
1725 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptology and Cipher Codes
Brittany Lewis Cryptology and Cipher Codes Math Fair Report

In a world where identity theft is on the rise, hackers are hard at work trying to get people’s credit card numbers, and where companies are getting your information to sell you unwanted things, tight security has become a large factor of keeping the personal and confidential information of our society safe. Cryptology and Cipher codes are commonly used ways to keep confidential information protected by preventing people not in on the secret from understanding what is being transmitted. Cryptology is the science of secure communication which is also the encoding and decoding of data. Cipher codes are more complicated because it is a method used to transform a message into an obscure form. The use of these secured messages has been dated back to the first societies of the world where they were used for many of the same reasons they are today. The first use of written cryptology was believed to take place at about 1900 B.C when an Egyptian scribe first used a non-standard form of hieroglyphics in his writing. Then in 1500 B.C in Mesopotamia (common day Iraq), an enciphered message in cuneiform was used to conceal a formula to make glazes for pottery. In the years 500 through 600 B.C, Hebrew scribes used a reverse alphabet simple substitution cipher to write the book of Jeremiah which was known as ATBASH. The Greeks used a device called a scytale (rhymes with Italy) in 487 B.C which consisted of a strip of leather that was wrapped and then written on then used as a belt which the recipient would be wearing as well and that would decode the message. The famous Julius Caesar used cryptology to keep government communications private throughout 50 to 60 B.C. Even the first president of the United States George Washington used encoded messages to send to his fellow soldiers. Therefore, cryptology and cipher codes have played large roles in the confidentiality of societies in the past



Bibliography: 1) Krystek, Lee. “The Unmuseum-Cryptology.” The Museum of UnNatural Mystery. 2000. Web.11.Nov.2011. http://www.unmuseum.org/cipher.htm. 2) Modular Arithmetic and Cryptology.” Web Catcher. Web. 11.Nov.2011. http://cs-netlab-ol.lynchburg.edu/sources/discmath/crypto.htm 3) “Braingle:Codes, Ciphers, Encryption and Cryptography.” Briangle Brain Teasers, Puzzles, Riddles Trivia and Games. 1999. Web. 11.Nov.2011. http://www.braingle.com/brainteasers/codes/index.php 4) “Cryptography.” Wikipedia, the Free Encyclopedia. Web.11.Nov.2011

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    E/M Codes Analysis

    • 160 Words
    • 1 Page

    E/M codes play a very important role in the billing process, the E/M codes represents 50% of all services rendered to the patient. To assign these E/M codes you must take certain criteria into consideration, such as place of service, the type of service, and the patient status. There must be documentation to support these codes. These codes are necessary for the ultimate reimbursement from Medicare, Medicaid, and also private insurances.…

    • 160 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Premiering September 30th, Code Black is a medical drama set in the busiest and most notorious ER in the nation where the extraordinary staff struggle in the face of a broken system to protect their ideas and the patients who need them the most.…

    • 941 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Best Essays

    paper is to identify the creator and purpose of E/M codes, and also to identify the three key…

    • 2145 Words
    • 8 Pages
    Best Essays
  • Good Essays

    For those of you do not know what a Cipher Wheel is, it's a wheel that can hold a secret message. To be in more detail, whenever a person would be sent a secret code they can use the Cipher Wheel to decipher the secret message. This is one of Jefferson most famous inventions yet. You can send secret messages on this just in a few easy steps you should by one today!…

    • 546 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Hansen, R., Harris, A., Phenix, A., Thornton, D. (2003). STATIC 99 Coding Rules – Revised 2003. Retrieved June 18, 2009 from http://ww2.ps-sp.gc.ca/publications/corrections/pdf/Static-99-coding-Rules_e.pdf…

    • 2465 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Rosetta Stone

    • 589 Words
    • 3 Pages

    In Egypt, around 6,000 BC, the first writing system was invented in the form of pictographs, little pictures drawn that represented words. The ancient Egyptians were very intelligent people. They invented many things that influenced their lives greatly in terms of advancement. The ancient Egyptians’ main written language, hieroglyphics, was important to preserve the records of their lives for centuries to come. In the ancient times, before paper was even thought of, Egyptians would carve the pictographs into stones or tablets. Historians, for a long time, were unable to decipher hieroglyphics because the art form had been slowly replaced by other written languages. That all changed when the Rosetta Stone was found in 1799. This artifact contained very important information that helped us learn much more about life in Ancient Egypt.…

    • 589 Words
    • 3 Pages
    Good Essays
  • Good Essays

    al., A History of World Societies, a civilization can be defined as a writing system will be developed and it will have an impact on other cultures. The Sumerians were one of the earliest urban societies to emerge in the world, more than 5000 years ago. They developed a writing system whose wedge-shaped strokes would influence the style of scripts in the same geographical area for the next 3000 years. All of these diverse writing systems, which encompass both logo phonetic, consonantal alphabetic and syllabic systems, became known as cuneiform. The ancient Egyptians believed that it was important to record and communicate information about religion and the government. They invented written scripts that could be used to record this type information. The most famous of all ancient Egyptian scripts is hieroglyphic. I interviewed my uncle Roy Bowie, Jr., who owns Bowie’s Liquor Store, and I asked him, “How important is writing in today’s society?” He responded by saying, “Writing is a form of communication. If you can’t write, you are limited from accomplishing a lot in life. If you can’t read, then you most definitely cannot write.” (Bowie, Jr.,…

    • 803 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Enigma Machine had 17576 possible combinations, and the only way to efficiently encrypt it was if the receiver had a predic ussd code to use the right sequences. The Turing machine solved this problem using an ingenious method. It manipulates symbols on a stip of tape to be more exact and precise in a mathematical sense. Meaning each code has few patterns…

    • 709 Words
    • 3 Pages
    Good Essays

Related Topics