The Dangers Of Cryptography And Encryption

Improved Essays
The famous American architect and inventor R. Buckminster Fuller once said “Humanity is acquiring all the right technology for all the wrong reasons.” ( The words of R. Buckminster Fuller are more relevant now than ever before; especially with the invention and use of dangerous technology such as encryption. Encryption works by using complex mathematical algorithms to scramble the contents of a file or message to another form, called ciphertext, which renders it unreadable to outside parties. Various encryption algorithms, many of which are unbreakable, are available for free public use around the world. Unimpeded public access to technology such as encryption gives unethical people the opportunity to abuse its power and commit crimes with …show more content…
The word cryptography can be split into pieces in order to better understand the word. The first part of the word cryptography, Crypto-, means “concealed, secret, hidden.” Graphy-, derived from the Greek word graphikos, means “of or for writing, belonging to drawing, picturesque.” (Online Etymology Dictionary) Put together, the word cryptography means “the process of writing or reading secret messages or codes” (Merriam-Webster Dictionary, ). In contrast, encryption simply means to perform any act or form of cryptography. Encryption is performed by scrambling the contents of a file or message through the use of complex mathematical algorithms. By doing this, the contents of the file or message become unreadable and will only become readable again when a user inputs a specific key or password. The algorithmic methods used to encrypt file contents and messages are very robust; meaning the average computer or even a supercomputer does not have the ability to crack it if the key or password is long enough. An article written on EETimes by Mohit Arora, a Security Architect, states that “even with a supercomputer, it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. This is more than the age of the universe (13.75 billion years).” This statistic reveals a frightening truth: nobody, …show more content…
There are various applications one can download onto their smartphones that allow the user to encrypt all outgoing and incoming messages. By doing this, drug dealers are able to conduct business with little risk of being caught or stopped by law enforcement. An article written on BrisbaneTimes by Kristian Silva talks about a mobile application called Wickr, stating that “Wickr messages are encrypted and can be erased by the sender once they have been read. The messages are also wiped from Wickr 's servers, leaving few clues for evidence.” Once again, encryption being publicly available allows for criminals to commit crimes with little or no chance of law enforcement preventing

Related Documents

  • Improved Essays

    The issues relating to the discerning use of technology has continually caused the attitude and perceptions to the social and ethical considerations of the use of technology. Stereotypically shown in the movie Die Hard 4.0, the unethical use of technology (Hacking/cracking) and other techniques was frequently used to achieve and set the tone of the movie. Unethically used by the main antagonist of the film “Thomas Gabriel” Used these techniques to create a “fire sale” which is broken down into 3 stages. To take out the transport networks, then utilities such as electricity and the water grid. Finally, to infiltrate secure financial records to gain a monetary boost to the attacker from the so called “fire sale” This example demonstrates how…

    • 208 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    As technology advances, members of the free society are able to access an increasing wealth of information. However, the Internet will always have the potential to revolutionize the world, both for the betterment of everyone and the detriment of everyone. In Lloyd Axworthy’s article “The Internet and Global Human Rights,” he compares the positives and negatives of the Internet. People have a higher potential to use the internet to pursue unethical ideas than good because the internet allows for spreading false information through the manipulation of facts, stealing of intellectual property through piracy of content, and creating a harmful atmosphere through false identities and privacy concerns.…

    • 1172 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    This can be done by setting a password on your computer, adding timeouts for when not in use for a period of time, and turning it off in general when not in use. These simple precautions stop local attacks, such as USB rubber ducky attacks. Many physical components can be taken by simply having access to the parts. And able to reset basic password by removing the CMOS battery from the BIOS, resetting the BIOS entirely, removing the password as well. A computer can also have physical damage when not supervised.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In today’s society, technology plays a major role. With the increase in technology comes an apparent decrease in privacy. Ultimately, leading to the question of: when and under what circumstances should the government be able to access information encrypted on personal devices? Universal Law…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In Ray Bradbury’s “August 2026: There Will Come Soft Rains” he writes, “ A dog whined, shivering, on the front porch. The front door recognized the dog voice and opened.” If we applied this to doors today in our houses, intruders couldn't pick locks or use the key that is hiding under the mat in front of the door to get into a house, because the key would be someone's voice.…

    • 962 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    In society today, nearly everyone has a cell phone or has access to the internet in one way or another. People are constantly using technology and always connected. While this connection is quite helpful for many things, the people in a society must also be careful not to let technology control them and take away their humanity. In Ray Bradbury’s novel Fahrenheit 451 and short stories The Smile, The Pedestrian, and August 2026: There Will Come Soft Rains, he addresses a central message to society. He warns that, while the technology itself is not necessarily evil, it is and will be if humans continue to abuse it and allow it to compromise their personal humanity and the condition of humanity as a whole.…

    • 1648 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Spying In 1984

    • 825 Words
    • 4 Pages

    Everything you do electronically can be tracked, saved, and manipulated, regardless of where you are. Widescale spying occurring today eerily mimics George Orwell’s 1984 in an imminent and frightening way, as average people are no longer as private as they used to be. In 1984, Winston is trapped within a totalitarian government that watches everything its residents do or say. These residents are spied on everywhere they go and are never immune to government overwatch. In the United States today, normal citizens are being watched by internet-connected devices, government big-data collection, and businesses looking for profit.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Dystopian World Technology is very manipulating in the American Society today. As technology advances in the future, it could have more access and control to the citizens than it does now. There are different types of technology that is being used to make life so much easier, things that the human mind does not completely understand. Technology seems so wonderful until someone who is smart enough looks behind the scenes at what its’ purpose is really being used for. With technology having access to information that should not come into contact at all, will affect how a citizen will live.…

    • 1054 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays