Cryptography: The Invasion Of Privacy

Improved Essays
Since the dawn of sending and receiving messages, people have had a need for keeping the information they send out to remain private and out of the hands of others. This need for security is the reason the field of cryptography was developed, from its early stages of moving letters around in words to the present use of computer programming to keep certain data safe. Cryptography is the reason we can securely use many day to day applications, but with all these developments come issues of unwanted government surveillance that threatens the privacy of citizens. These issues may be detrimental to the privacy of the information sent and received but cryptography is here to stay as a necessary means of passing that information from one party to another.
Cryptography began as soon as language and writing were developed, some early forms were the use of hieroglyphics, or the use of secret messages on animal skins to tell stories or to pass along messages. These more primitive methods lead to the Cipher (or Caesar) disk where there were two rings of the alphabet and the inner ring could be moved around within the circle in order to give each outer alphabet characters a new corresponding letter (Ellison). This process was known as transposition, where letters would be moved around in a uniform way by “adding” to a
…show more content…
The government needs to ensure that any sensitive information they have stays with only them, but there are constant threats to that privacy. On the other had if there is information being passed around on an encrypted message and the government needs to know about it because it poses a security threat they should be able to hack into that message in order to keep their country safe. Because of both these viewpoints most governments feel the needs to have a huge amount of control over what is happening inside their area in order to maintain order and

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    For instance, there recently has been a case where the Governemnt and Apple have debated over the phone of Syed Rizwan Farook one of the gunmen from the San Bernadino shooting. This case is called PRISM. The question is shouldn’t the government have more control then Apple; a phone company? The answer consists of two parts, yes the government should have more control then a phone company but, the government should not have complete control of peoples personal privacy on their phones that’s where the controversy comes in to place. If we give the government control of our privacy, its one step closer into becoming a totalitarian government.…

    • 1292 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    9/11 Research Paper

    • 1583 Words
    • 7 Pages

    The purpose of the government having surveillance everywhere is to not only catch crimes that have happened, but also to prevent future crimes. Sinha (2013) explained how along with video cameras recording the public, the government also had spy programs that monitor phone calls, text messages, and emails for up to a year (p. 866). Following the tragic 9/11terrorist attacks, the government started using surveillance to monitor the public to prevent future attacks and…

    • 1583 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Many people say that the government needs to be able to have control over people's cell phones and they need to know what everyone is doing on the internet. This issue is called Privacy v.s. Safety. Many people would want to give up their ‘right to privacy’ in order to be safe and other people would just rather have their privacy.…

    • 1088 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    The government can potentially cause an intrusion of privacy and abuse their power on the people who trust them to handle their information legally and…

    • 816 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    There Is No Such Thing as Privacy “It was even conceivable that they watched us all the time.” These are the words Winston Smith and all of Oceania had to live by. George Orwell’s 1984 warns us about totalitarian regimes. The government, Big Brother, abolishes the citizen’s freedom and their own personal privacy, and even into their personal thoughts.…

    • 1346 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Some were simply unaware that government surveillance occurs at all. The purpose of this project is to make people aware of surveillance and to show them the harmful effects that surveillance can have. In order to do that, I have to provide some background. First, I need to explain encryption.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The United State Government should tell everyone what he or she is doing and why he or she is doing it. The citizen should be able to know what is going on and what they can do. The United States Government has to start looking after the people not only what they are…

    • 1103 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The famous American architect and inventor R. Buckminster Fuller once said “Humanity is acquiring all the right technology for all the wrong reasons.” ( The words of R. Buckminster Fuller are more relevant now than ever before; especially with the invention and use of dangerous technology such as encryption. Encryption works by using complex mathematical algorithms to scramble the contents of a file or message to another form, called ciphertext, which renders it unreadable to outside parties. Various encryption algorithms, many of which are unbreakable, are available for free public use around the world. Unimpeded public access to technology such as encryption gives unethical people the opportunity to abuse its power and commit crimes with…

    • 1007 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Have you ever heard of Spy-Free or Spy-Proof Emails? Most of people do not know well about the importance of privacy in their email and even they realize its importance, they are not sensitive to it. Now, the world’s best-known email providers Yahoo, and Google put in a great deal of effort to encrypted email system. They will introduce a new secure email system in the near future. However, some experts bring up several problems of encrypted mail.…

    • 837 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays