Negative Effects Of Cryptography

Superior Essays
Everyone has secrets they want to protect. Whether it is on computers, on paper, or verbal, secret communication has been around since humans could first communicate. Cryptography is the way we can transmit secret messages so that only the person it is meant for can understand it. The art of coding and decoding messages has progressed immensely through time, and has become increasingly difficult to break with the use of technology. Cryptography’s evolution has transformed the computing world into what it is today, and this comes with positive and negative effects. As long as people have secrets and want to transmit them, cryptography will continue to evolve. Cryptography has developed rapidly and tenaciously in the world of computing technology, …show more content…
The integration of cryptography in computers has created an entire field of breaking and creating codes in society. Classic cryptography has escalated to a level where it is extremely difficult to decipher. This progression has contributed immensely to society and helped it in many ways, and has become increasingly vital to our well being. A few major examples of the impact of cryptography on society are the prevention of terrorist attacks, war prevention, encrypting financial information, and securing our country’s secrets from others. With increased ability to shelter secrets, there is also negative impact. Illegal activity can expand in this computer-reliant society due to indecipherable codes, more access to personal information through cracking passwords, and untraceable websites. Most of the Internet is the “dark net” because of things like cryptography, but without it the computing technology world would not be what it is …show more content…
Modern cryptography uses binary arithmetic because that is what computers use, and cannot be represented in the previous methods of encrypting. The different types of ciphers used in modern cryptography are made for computers, and that is why there is such vast use of them today. Stream ciphers and block ciphers are the two classes of algorithms (Gove 1). “Stream ciphers operate on essentially continuous streams of plain text represented as 1s and 0s, while Block ciphers operate on blocks of plain text fixed size” and the most involved algorithm is a stream cipher because it “tends to be implemented more in hardware devices while block ciphers are more suited to implementation in software to execute on a general purpose computer” (Gove 1). Without these ciphers, we could not operate how we do today. The Internet allows for exchange of information instantly, and this private information in our economy, military, government, and private sectors need to be securely transmitted. We are “more dependent on the Internet and automated information systems than any other country in the world, however, the very technology that created this independence is also its greatest weakness” (Gove 5). Unfortunately, these ciphers are not entirely reliable and secure. With growing usage of cryptography, the ciphers we use today, stream and block, are not completely safe from breaches. Codes are

Related Documents

  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The chapter opened by discussing how digital information that people may think is hidden, or even destroyed, is often still accessible to the public. The authors described how the bits that store a given piece of information are never destroyed, but simply overwritten by other data when files are replaced or “deleted.” The descriptions of the people who sold their devices to people, only to have the people who bought their devices to discover personal identification information, “deleted” documents, and even credit card account…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The article “Quantum Computer Comes Closer to Cracking RSA Encryption” written by Amy Nordrum, shows that Cryptography needs to be important, because of the fast developing of new technology. In her article Ms. Nordrum tells about computer scientists from the MIT which found a way to crack the RSA (Rivest, Shamir and Adleman)-Code. On the fact, that RSA Encryption is used in all our devices it is quite frightening to know that the government is maybe already using this kind of technology for decipher our messages. Since the invention of the Quantum Computer everybody knew that we have to improve all our security software, but nothing changed. All our privacy in form of messages or passwords for bank accounts are secured by a Code from 1977…

    • 257 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    World War II is an historical event that is considered as the most tragic and disastrous as over 60 million people were killed. Many nations, groups and people mobilized together in order to fight back against the Nazis, including the scientific community. In 1939, when United Kingdom declared war on Germany, Alan Turing and his team worked together to break the code of the Enigma machine and thus have access to the German military communication ( SOURCE). This essay is about the cryptanalysis of Enigma. In order to clearly explain this process, in this essay I will focus on the Enigma machine, the Bombe Machine and Alan Turing.…

    • 535 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the post 9/11 era “Smart Borders” has become a multi-faceted political, economic, and international endeavor balancing policy, to facilitate the safe and legal flow of goods and people through an array of technologies. After 9/11 extra attention was placed on cargo transportation systems, inspection technologies, and traffic management systems in an effort to ease congestion at the borders and extend inspections to include points of departure abroad (Andreas, 2009). Furthermore this emphasis was reinforced by the thirty points “smart border” declaration signed between Canada and the United States, and shortly after with Mexico (Andreas, 2009). The concept behind smart borders was to create a layer approach to border controls and cross…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Miller, J. and J. Miller., (2009). 21st Century Criminology: A Reference Handbook. 1st ed.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Technology has advanced tremendously in the past several years, through this advancement comes change in the way of many careers, one of which being law. The increasing means of technology has allowed for the accessibility to increase as well. With law, technology is a great tool to use in a case, therefore the ability to have access is drastic. Technology is more available now than ever, in the closest reach to each individual. Additionally, with the increasing ability comes an increasing demand in the way individuals rely on technology in their everyday lives.…

    • 480 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Has the Rise of Technology Negatively Impacted Relationships? As technology has became a pivotal part of society, it has changed the way that humankind interacts with one another. Technology allows people to communicate with others that could be thousands of miles away, or even across the world. This communication could be through ideas, opinions, and pictures that are shared in a way that was not possible in any other time period. Though technology has allowed people to do so many amazing things, it has also allowed for some not so great things to occur.…

    • 1399 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Police Technology

    • 1272 Words
    • 6 Pages

    Technological advances can be a huge advantage to the law enforcement community, but may also be a disadvantage as well. Technology. As the use of the Internet and other computer networks has grown rapidly in recent years, so has the opportunity for electronic crime. Unlawful activity can be committed or facilitated online. Criminals can trade and share information, mask their identity, identify and gather information on victims, and communicate with co-conspirators.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The chaos and confusion formed in Europe after World War I laid the foundation for what would soon be a global war even more devastating than the first, and only two decades later. The Second World War was an onslaught of the western hemisphere originally brought on by Germany, and then followed by Italy and Japan. Millions died on both sides of the war, either fighter for mass unity or mass freedom. It was a dark age of mass genocide towards Jews and other minorities in Germany, as well as the deaths of thousands resulting from the atomic bombs dropped on Japan. Not much came from the war, other than the ash and rubble of cities that required reconstruction, except for one outcome.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Laws help codify the values of a society, maintain order among the population, and protect citizens from being abused and harmed by dangerous criminals. However, recent technological trends have required the government to address the intensifying problem of identity theft. Because identity theft has become prevalent throughout the US society, many legal and criminal justice scholars have articulated the different types of identity theft and the consequences that the victims and offenders often experience. Identity theft relates to instances in which an offender steals and uses the information of a victim to fulfill criminal activities or acquire financial gains, the victims are often inflicted with detrimental financial losses and a damaged…

    • 1439 Words
    • 6 Pages
    Improved Essays