Different Features Of Cryptography

Improved Essays
Cryptography is the study and practice of secret writing and communication. It could also be said to be art and as such provide the keys and locks of the Information Age. Secret writing developed into two different branches. One of them is steganography, derived from Greek words meaning “covered” and “to write”. Cryptography was created in parallel to this. It originates from the Greek word of kryptos meaning “hidden”. Whereas in steganography the purpose is to hide a message, so that it cannot be found easily, in cryptography the aim is to hide the meaning of the message through the means of encryption. These all are part of secret writing. Written with the purpose of covering or hiding the message so that no other individual, except the …show more content…
In a general level the functions of scrambling and unscrambling messages can be called encryption and decryption, thought depending on which technique is used there exists a more specific vocabulary. The opposite of cryptography is cryptanalysis, the science of breaking codes and ciphers. One of the earliest cryptanalytic techniques is frequency analysis, a process which was first described by “the philosopher of Arabs, al-Kindi” in the ninth century. The basis of this technique is the analysis of the frequency of the characters that appear in the ciphertext and their relation to the …show more content…
In this paper I claim, that because cryptography has evolved so greatly and significantly during it’s history, it will continue to adapt more in the future and will be used for a number of different reasons form recreational cryptography to full blown warfare. I will also attempt to explain in a clear way some of the different types of cryptography and cryptanalysis through historical examples and attempt to make a hypothesis about the future of cryptography, codes, cyphers, and everything that goes into keeping secrets secret. Now days, because of the technological advancements in the field, cyphers are barely more than some light fun. Now most of cryptography is based on encryption and safekeeping of virtual information. Some people believe that, because of recent technological developments, including quantum computing, cryptography is running out of

Related Documents

  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Dbq Han History

    • 103 Words
    • 1 Pages

    During Han times, a eunuch named Cai Lun came up with a great innovation that would change learning forever. It was paper. But back then, paper was normally used to wrap fish than writing stuff on it. So only few written documents have survived to this day that were mostly found in tombs. Back then most people would write on bamboo slips or wooden tablets.…

    • 103 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Biometrics is the science of analyzing different biological data. A example of what you could be analyzing is DNA. Biometrics also involves the use of many different technology equipment. The article Biometrics: From Reel to Real by Dan Tynan talks indepth about all the different things that can be used to determine who you are. First they talk about how they use biometrics in everyday life, like at businesses and schools.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hahnyok Chapter 1 Summary

    • 831 Words
    • 4 Pages

    Hanyok, Robert J., eavesdropping on hell: historical guide to Western communications intelligence and Holocaust, 1939 – 1945 (second edition republication), Center for Cryptologic History, National Security Agency, 2005 As a historian and intelligence analyst for the US Department of Defense, Hanyok has created a thorough analysis of communications intelligence of World War II. Thanks in part to the declassification of Allied communications from World War II known as “Ultra”, Hanyok was able to produce a clear interpretation of its use. This compelling book also provides visual representations of intercepted communications and equipment, a glossary of terms, and an impressive list of sources. In the first section of chapter 1 “the context of European and Nazi anti-Semitism”, Hanyok reveals the plight of the Jewish people as animosity between other cultures and Jews was perpetually changing in potency.…

    • 831 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The article “Quantum Computer Comes Closer to Cracking RSA Encryption” written by Amy Nordrum, shows that Cryptography needs to be important, because of the fast developing of new technology. In her article Ms. Nordrum tells about computer scientists from the MIT which found a way to crack the RSA (Rivest, Shamir and Adleman)-Code. On the fact, that RSA Encryption is used in all our devices it is quite frightening to know that the government is maybe already using this kind of technology for decipher our messages. Since the invention of the Quantum Computer everybody knew that we have to improve all our security software, but nothing changed. All our privacy in form of messages or passwords for bank accounts are secured by a Code from 1977…

    • 257 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Alan Turing’s Invention Of Bombe : Caused The Alteration Of The Modern Era and World War II Introduction In the mid-twentieth century war broke out once more, for it lead to misfortunes and bloodshed, until a certain man stepped into the battle to alter the outcome of war. The man’s name was Alan Turing, and his intellectual mind of computer technology gave a gift for the Allied Powers to counterattack Nazi Germany. With the help of the codebreaking machine Bombe it has done a big help on hacking into German communications of World War II.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1.Due to the supposed negative consequences anchor babies pose citizenship birthright to citizenship has become a main component of in immigration. Anchor Babies is a new term coined to describe children born from undocumented parents (Kendall 350). 2“Believing that the 14th amendment alone would be the answer as to what to door how to see anchor babies is not there is too it upon closer examination the results of such ideas reveal that that actions towards this subject should not be taken lightly. This article shows a combination or history about birthright citizenship, and legislative cases,” (Kendall 350). 3.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Edward Snowden Outline

    • 548 Words
    • 3 Pages

    When you make a phone call, send a text message, or message someone on Facebook it is highly likely that the intended recipient isn’t the only one to read your messages or to listen to your words. Someone at a government or private agency is being paid handsomely to carefully observe your life mostly with the help of that little, smart device in your pocket. II. Thesis Edward Snowden – a whistleblower, traitor, hero and a patriot. This name and these associated titles may sound familiar from the news or websites similar to Reddit, but not many of you are aware how he exactly earned those titles.…

    • 548 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The regulation of encryption program today is in so much debate globally as an alternative than within the states. The United States regulations are extra lenient now than ten years ago, however different nations worldwide should not so fortunate. The U.S. government granted the freedom for corporations to sell and export encryption software with extra ease which has allowed the enterprise to grow and be extra progressive. Local governments around the world were impacted by using the inspiration if encryption legislation and have followed within the footsteps of the USA, but applied tougher measures to have extra manage on using the technological know-how. A country that has rough encryption laws is China.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    While many deem technology as oppressive and intrusive, it has completely reshaped our society in many positive ways. Singer presents the question on whether our technology will liberate us from our oppressive government. Although technology does possess negative advantages, it contains positive ones as well. For instance, in the article, The Terrorist in the Data, the French police were able to utilize the vital aspects of data and surveillance to locate the suspects in the terrorist attack that occurred in Paris in 2015. It is these events where the use of technology comes into vital play.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Encoding and Decoding is they way in which media, is produced, travels and is consumed (Hall, 1980:128). We decode messages…

    • 1787 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays

Related Topics