Preview

Networking

Powerful Essays
Open Document
Open Document
1382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Networking
Cryptography is derived from the Greek words kryptos meaning “hidden” and graphien, meaning “to write/study”. The process of making and using codes to secure the transmission of information is called cryptography. Before modern era cryptography was synonymous to encryption but today cryptography is heavily based on mathematical theory and computer science practice. Cryptography today deals with the ways to transfer information in such a manner that no one beside the recipients can read what was actually sent and also more advanced crypto techniques deal with ensuring that the information being transferred has not been compromised in the transit. Cryptanalysis is the process of obtaining the original message (Plaintext) from an encrypted message (ciphertetext) without knowing the algorithms and keys used in encryption. Crypto is a tool that can be used in both good and bad ways. Some of the good crypto uses are:
• Protecting the location of our troops in war zone
• Protecting the nuclear launch codes
• Protecting national security information
• Protecting research data
• Protecting a new research idea

2. Cryptographic Algorithms
Cryptographic Algorithms are the set of rules used to encipher and decipher messages in a cryptographic system. It is a process which uses encryption allowing only authorized party to access the information. Cryptographic algorithms are grouped in two categories:
• Symmetric-key Cryptography
• Asymmetrical -key Cryptography

2.1. Symmetric key Cryptography
Symmetric Key Cryptography uses the same cryptographic keys to encipher and decipher the message using symmetric encryption. The sender and receiver share the same key. Symmetric encryption method use mathematical operations that can be programmed into extremely fast computing algorithms which makes encryption and decryption of the messages quick even with the small computers. With the Symmetric encryption the secret key should be send through different channel or band to

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    HSC LEVEL 3 Unit 107

    • 861 Words
    • 3 Pages

    1.1 - Communication is a two way process and is how a person will send a message and how a person will receive and understand the message. Communication is not only about the words used but the manner in which you use them. The main feature of two way communication is the flow of information from both ways. This process is called a communication cycle. Communication always has a purpose and this may be to pass on information or an idea, to express a need or want to persuade someone to do something, share confidential information and share or express emotions. A message coded is when an individual thinks about how they are going to say what they are thinking and decides in what form the communication is, this could be in spoken words or sign language. An individual will then put it into this form. A message understood is if the message has been communicated clearly and the other person has concentrated and there are no barriers to communication, the other person understands the message. They show they have understood by giving feedback. The stages of the communication cycle are repeated backwards and forwards as long as the conversation goes on.…

    • 861 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    1. Cryptography is needed for mobile devices and media, as well as protections and encryption on any company systems and hardware.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Psychology Key Terms

    • 540 Words
    • 3 Pages

    algorithms - An algorithm is a set of instructions for solving a problem or completing a process…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    network

    • 810 Words
    • 4 Pages

    1.Which of the following terms is the cloaet synonym to the term computer networking? Protocol…

    • 810 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    The American Civil War created a new urgency for techniques in both cryptography (the manufacture of codes and ciphers) and cryptanalysis (the breaking of codes and ciphers). It also introduced new…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Binary Code

    • 597 Words
    • 3 Pages

    Here's an example of the Binary Code in action: When you type the letter A on your keyboard, electrical signals are sent from the keyboard to the CPU. The CPU turns the signals into binary code. Then, the computer reads the code and sends it on to the monitor to display the letter A.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This communication process is divided into several basic components such as a sender transmits a message through a channel to the receiver. The sender first develops an idea which is composed into a message and then transmitted to the receiver that is who is interprets the message and receives meaning. Developing a message is known as encoding. Interpreting the message is referred to as decoding.…

    • 521 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The DES algorithm works on the Feistel Cipher principle, and the AES algorithm works on substitution and permutation principle.…

    • 734 Words
    • 3 Pages
    Good Essays