Cryptography: The Invasion Of Privacy

Improved Essays
Since the dawn of sending and receiving messages, people have had a need for keeping the information they send out to remain private and out of the hands of others. This need for security is the reason the field of cryptography was developed, from its early stages of moving letters around in words to the present use of computer programming to keep certain data safe. Cryptography is the reason we can securely use many day to day applications, but with all these developments come issues of unwanted government surveillance that threatens the privacy of citizens. These issues may be detrimental to the privacy of the information sent and received but cryptography is here to stay as a necessary means of passing that information from one party to another.
Cryptography began as soon as language and writing were developed, some early forms were the use of hieroglyphics, or the use of secret messages on animal skins to tell stories or to pass along messages. These more primitive methods lead to the Cipher (or Caesar) disk where there were two rings of the alphabet and the inner ring could be moved around within the circle in order to give each outer alphabet characters a new corresponding letter (Ellison). This process was known as transposition, where letters would be moved around in a uniform way by “adding” to a letter in order to get a new one for instance A+2 is C. This was a very useful way to send messages, but there were only 26 possibilities because there are only so many letters in the alphabet so the messages could be hacked fairly easily. As civilizations began to develop and technology improved, the ideas and methods became more advanced and mathematics began to be involved which started the idea of substitution where each letter was replaced with another. The most general substitution cipher has 26! amount of possibilities- this corresponds to around 10^(23) possibilities (Singh). This extremely high number made it impossible for the message to be cracked in the time it was popular, and even today it would take a computer and entire day to go through all of the possibilities and find the right one. Cryptography became more advanced and secretive which encouraged people to think outside the box on how to break the ciphers which is where the term cryptanalysis, or code breaking, came from. When substitution was still the primary form of encryption the cryptanalysts noticed that each replacement letter would take on all of characteristics of the old letter which allowed for frequency analysis to develop. Cryptanalysts noticed that the letter E was the most commonly used letter in the alphabet (13% of all letters used) so if the letter E was replaced by the letter W then W would appear 13% of the time. From here the cryptanalysts studied all of the letters in the alphabet to see which letters were most or least likely and from there could break the cipher of the messages they intercepted (Singh). Once this process was figured out it became easier to crack any substitution cipher because each letter was only represented by one other letter. The creation of the Enigma machine became the next step in the field of cryptography to combat frequency analysis. The Enigma machine had three parts: the input keyboard, the output lampboard and the scrambling device. The scrambling device was the key to making the machine unbreakable for so long because after each letter was inputted, the scrambling mode changed which in turn changed the output value of the input letter so that multiple A’s wouldn’t all come out as T’s but would be multiple different letters (Crawford). The code for what each letter represented was changed
…show more content…
The government needs to ensure that any sensitive information they have stays with only them, but there are constant threats to that privacy. On the other had if there is information being passed around on an encrypted message and the government needs to know about it because it poses a security threat they should be able to hack into that message in order to keep their country safe. Because of both these viewpoints most governments feel the needs to have a huge amount of control over what is happening inside their area in order to maintain order and

Related Documents

  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    9/11 Research Paper

    • 1583 Words
    • 7 Pages

    The purpose of the government having surveillance everywhere is to not only catch crimes that have happened, but also to prevent future crimes. Sinha (2013) explained how along with video cameras recording the public, the government also had spy programs that monitor phone calls, text messages, and emails for up to a year (p. 866). Following the tragic 9/11terrorist attacks, the government started using surveillance to monitor the public to prevent future attacks and…

    • 1583 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    There Is No Such Thing as Privacy “It was even conceivable that they watched us all the time.” These are the words Winston Smith and all of Oceania had to live by. George Orwell’s 1984 warns us about totalitarian regimes. The government, Big Brother, abolishes the citizen’s freedom and their own personal privacy, and even into their personal thoughts.…

    • 1346 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Many people say that the government needs to be able to have control over people's cell phones and they need to know what everyone is doing on the internet. This issue is called Privacy v.s. Safety. Many people would want to give up their ‘right to privacy’ in order to be safe and other people would just rather have their privacy.…

    • 1088 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The government can potentially cause an intrusion of privacy and abuse their power on the people who trust them to handle their information legally and…

    • 816 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The famous American architect and inventor R. Buckminster Fuller once said “Humanity is acquiring all the right technology for all the wrong reasons.” ( The words of R. Buckminster Fuller are more relevant now than ever before; especially with the invention and use of dangerous technology such as encryption. Encryption works by using complex mathematical algorithms to scramble the contents of a file or message to another form, called ciphertext, which renders it unreadable to outside parties. Various encryption algorithms, many of which are unbreakable, are available for free public use around the world. Unimpeded public access to technology such as encryption gives unethical people the opportunity to abuse its power and commit crimes with…

    • 1007 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Some were simply unaware that government surveillance occurs at all. The purpose of this project is to make people aware of surveillance and to show them the harmful effects that surveillance can have. In order to do that, I have to provide some background. First, I need to explain encryption.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The United State Government should tell everyone what he or she is doing and why he or she is doing it. The citizen should be able to know what is going on and what they can do. The United States Government has to start looking after the people not only what they are…

    • 1103 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Have you ever heard of Spy-Free or Spy-Proof Emails? Most of people do not know well about the importance of privacy in their email and even they realize its importance, they are not sensitive to it. Now, the world’s best-known email providers Yahoo, and Google put in a great deal of effort to encrypted email system. They will introduce a new secure email system in the near future. However, some experts bring up several problems of encrypted mail.…

    • 837 Words
    • 4 Pages
    Improved Essays