Cryptography history of cryptography the word

Egyptian Fine art, History Of The Internet, Cyber Criminal offenses, Nasa

Remember: This is just a sample from a fellow student. Your time is important. Let us write you an essay from scratch

Get essay help

Research from Term Paper:

In this manner, if the transmitted info is intercepted by a cyber-thief, the information will remain useless to him as it is in a great encrypted type that is incomprehensible to him.

Banks is another common end user of cryptography and whose input and output details are essential and must remain private. These days, a large proportion of banking transactions can be done on the web. Hence it is extremely critical that the information of bank clients is highly guaranteed. If you are to access a banking on the net site, it is noticeable that a warning can be provided to the user updating him that the site he can about to get is guaranteed. Moreover, this kind of secured sites are proclaimed by a lock icon shown at the bottom area of the user’s browser. Within a user’s session within a secured site, it is typical that cryptography works on the background of each and every information exchange that occurs between the user as well as the site’s program. This happens to ensure that all information sent and received by user is authenticated and secured.

You will discover more areas particularly on the net where cryptography is being applied. All of which aims to ensure that info transmitted between sender and receiver stay secured and authentic.

Reliability Considerations

In the history of cryptography, the methods at which data can be encrypted include transformed from the simplest kind into sophisticated ones. These kinds of development happens in an make an effort to ensure that more robust security is usually enforced about information exchange. It may not be considered though that cryptography, via security and decryption of data, is actually a 100% certain data protection measure. The reason is , several reviews show that cryptography continues to have a small amount of weeknesses. it, nevertheless , reduces at a high percentage the possibility that data can be assaulted by malevolent activities. One particular proof to the vulnerability of cryptographic encryption method and something to consider when employing cryptography was recently reported by the Computer Security Resource Centre. The record states this.

An strike has been found on some implementations of RSA digital signatures using the support scheme of PCKS-1 when the public important e = 3. The same attack is also applied to implementations of digital signatures while specified in American National Standard (ANS) X9. 31. Note that this attack is definitely not around the RSA criteria itself, yet on incorrect implementations of the signature confirmation process. “

Although the survey indicates the attack can be caused by incorrect implementation, the final outcome in the end is that there is even now a possibility that information is definitely not entirely secured.

One other online resource indicates the following cryptography weakness that is essential to consider, particularly when using WEP (Wired Equal Privacy) cryptography.

WEP cryptography is not so secure whatsoever. A daily news from cryptography analysts known as the security algorithm “kindergarten cryptography. inch Actually, software exists that exploits a huge security hole in the encryption standard. This software listens to the protected network targeted traffic, analyzes it, and after just a few hours it reveals the password to the network in clear text. The more traffic within the network, the simpler it is to identify the pass word because several packets are extremely weak because they hold a bad so-called initialisation vector (IV). Latest access items try to avoid these kinds of bad IVs, so it is getting harder to use the hole. inch

Other features of consideration when putting into action cryptography are definitely the following.

Securing physical use of an area

Privacy of encryption methods used

Making back-up

Continuous research and study that can ensure the strength of cryptography method being utilized.


Hebert, S. (2001). A Brief History of Cryptography.

Retrieved on August 14, 06\, from On-line.

Web site: http://www.cybercrimes.net/Cryptography/Articles/Hebert.html


Retrieved on August 14, 2006, from Wikipedia Online.

Site: http://en.wikipedia.org/wiki/Cryptography

Public-key Encryption.

Retrieved on August 14, 2006, from Webopedia Online.

Web site: http://www.webopedia.com/TERM/P/public_key_cryptography.html

Symmetric-key Encryption.

Recovered on Oct 14, 06\, from Webopedia Online.

Web site: http://www.webopedia.com/TERM/S/symmetric_key_cryptography.html

A great Attack about RSA Digital Signature.

Gathered on August 14, 06\, from National Institute of Standards and Technology Online. Web site: http://csrc.nist.gov/news-highlights/RSA-statement_10-12-06.pdf

Security Considerations on WEP Cryptography.

Recovered on October 14, 06\, from On the net. Web site: http://docs.kde.org/stable/en/kdenetwork/kwifimanager/wep.html

Related essay

Category: Legislation,

Topic: Site http,

Words: 887

Views: 214