Basic Importance Of Cryptography

Great Essays
Cryptography is a science or art that protects data and information from unwanted intruders through transforming the information to a format that is unreadable. The people with the required authentication are the only ones can read or return the data to original form. It is a system dependant mainly on the usage of a key and the main basic principle of network security.
Cryptography involves plain text, which is the text that someone will type in a form that is understandable to the human. This plain text will then undergo encryption, which is a technique that converts plain text into a form that is not understandable called cipher text. The cipher will then undergo transmission towards the receiving party. A particular encoding method forms the basis for choosing series of numbers or letters that thereafter form a key. This will form the basis for encryption and
…show more content…
Cryptography plays an essential role in this in three different ways. Firstly, it ensures confidentiality because only the receiver and sender are capable of comprehending the message. The principles of decryption and encryption ensure the achievement of this role. Secondly, it ensures authentication because both the receiver and sender have to confirm that each of them is as they claim to be and the right person whom communication is intended for. The fit is possible through digital signatures principles. Thirdly, cryptography ensures message integrity. If poor security is present, the integrity of data may be lost even after authentication. Cryptography alongside the hash function ensures that messages retain their integrity by eliminating accidental or malicious altering. However even with the confirmation of confidentiality, message integrity and authentication the security is still imperfect with the necessary access control, which is under provision by gateway applications such as firewalls and package

Related Documents

  • Decent Essays

    Nt1310 Unit 1 Case Study

    • 333 Words
    • 2 Pages

    1. Message confidentiality means that a message being sent cannot be read by anyone other than the intended recipients, and message remains confidential and it cannot be read by unauthorized ones. Integrity defines the process of data is modified based on cryptographic procedures like hashing and message code techniques that ensures the message is not modified.…

    • 333 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    In the 3rd Section, we will see how blockchain protects personal data, Enhances Data integrity, Traceability and Non-repudiation, how it mitigates DDOS attack and how virtual machine orchestration security is provided by Blockchain. In the 4th section, we will find out some security issues in blockchains like…

    • 625 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    ISP: An Internet Service Provider is a company that provides you with services that provide you with the connection to the internet. The main services the company provides are: Broadband, TV and Phone. Here are some ISP’s: Virgin Media, Sky, BT and Talk Talk. Different companies offer different broadband speeds, Virgin Media provide speeds from 50Mb, 100Mb and 200Mb.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Study Guide

    • 703 Words
    • 3 Pages

    1) What is BI? Business intelligence, or BI, is an umbrella term that refers to a variety of software applications used to analyze an organization’s raw data. Companies use BI and several related activities, including data mining, online analytical processing, querying and reporting to improve decision making, cut costs, identify new business opportunities and identify inefficient business processes that are ripe for re-engineering. 2) What is Visual Analytics, dashboards, data warehouse, data dictionary, meta data, ETL, schema, attributes, hierarchy, cube, OLAP, “drill down”, data mining, data mapping.…

    • 703 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    1) Eavesdropping: It can be defined as secretly listening to the private conversation of others without their consent. Here an attacker can choose to passively eavesdrop on the network communication and steal the data. Through passive eavesdropping attackers apparently eliminate their presence in the network and make such attacks difficult to detect. The goal of such an attack is to violate the confidentiality of the communications by intercepting the network and sniffing or listening to the routing packets. Also, an adversary can actively influence the communication channel by disrupting, jamming or modifying the network packets and/or inserting false packets into the network.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Robert Elliot’s Our World Our Music gives an elaborate answer to the question what is music? Elliot focuses on the history of music and the social changes that were the catalyst for all these unique sounds we hear today. He defines music as “the universal language (1)” continuously implying how impactful and connecting music has been throughout time. The first instrument was discovered in 41,000 B.C and it resembled the flute (1). Although the instruments that make the musical sounds are important, one must fully understand form and structure because they are the two key elements of music.…

    • 504 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Biometrics is the science of analyzing different biological data. A example of what you could be analyzing is DNA. Biometrics also involves the use of many different technology equipment. The article Biometrics: From Reel to Real by Dan Tynan talks indepth about all the different things that can be used to determine who you are. First they talk about how they use biometrics in everyday life, like at businesses and schools.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Memory In Inside Out

    • 788 Words
    • 4 Pages

    The first step, encoding is the rendering information into a way in which it can be used. This means that encoding is a way of processing information.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    For example if a child is having problems at home which is not being communicated to staff then it may affect that child’s behaviour or attitude to school. By being open to all involved, you can prevent this and be immediately aware of any issues and therefore assist that child in coping. If communication is effective parents/carers are more likely to contribute to and offer support to the school. Also Communication is important because it provides you with a link to between people.…

    • 3030 Words
    • 13 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Communication allows us to share ideas, feelings and facts and in the times we now live in, communication can be done in so many different ways (social media, e-mail, Internet, telephone, radio and television). It is so much more easier now to communicate with people on the other side of the country or even on the other side of the world than it was a decade ago and this is due to the huge advances in communication technology, we are all instantly connected with each other more than ever, we can send and receive messages and pictures instantly from anywhere in the world. We all use communication technology from the moment we wake, until the moment we go to bed, our alarm goes off in the morning to tell us to get up, we turn the radio on in…

    • 799 Words
    • 4 Pages
    Decent Essays