When a message is encoded so it becomes unreadable while making sure only the intended receiver is capable of decoding it back into its original form is what we commonly known as Cryptography. It is done by means of an encryption and decryption algorithm (often the same implemented in reverse order) and very often using a secret key. Some of the early cryptographic systems kept the algorithm itself secret and did not use a key (Stallings, 2014).
Only when using a secret key one can convert cipher text back into a more familiar readable form. Another way to achieve this is by using computerized aid devices, which use mathematical formulas to change text from one form to another (Stallings, 2014).
The Basic Elements of a …show more content…
Steganography is where a plaintext message may be hidden in one of two ways. There are two primary Steganography methods to conceal the existence of the message, plain sight and encoded (Stallings, 2014). A simple but time consuming to build form of Steganography is the arrangement of words or letters within a normally written text that, once rearranged, spells out the real message (Stallings, 2014).
Other techniques used in steganography include marking characters, where carefully selected letters of printed or typewritten text are overwritten in some other fashion such as pencil or ink. These marks are not visible at first sight unless the paper is held at a specific angle into bright light. Other method to achieve this is puncture small holes with a pin on selected letters that will not be visible unless the paper is held up again into bright light at the right angle. Typewriter correction ribbon was also used in between lines resulting with the correction tape being visible only under a strong light (Stallings, …show more content…
With new threats and plots being developed each day, the need to encrypt and decrypt secure communications is at an all-time high. Here in the United States the National Security Agency uses cryptanalysis to protect the nation from threats both here and overseas. All branches of the United States Armed Forces require secure communications during war and peace. The development of new cryptographic systems is paramount in keeping those forces ready. Cryptography has uses in every part of modern life, it is used in the healthcare sector as well as the financial sector and also protects critical infrastructure such as the national power grid and air traffic control systems. Given that we now live in the age of electronic communication it is safe to assume that the functions and needs for cryptography and cryptanalysis will continue on for the foreseeable