blog




  • Essay / The History and Applications of Cryptography - 1296

    Cryptography is the study of secure or secret communications. Cryptography has been around for thousands of years. Cryptography has been around for thousands of years. Cryptography deals with authentication, confidentiality and data integrity. There are many different implementations of cryptography in information systems. This article will cover hashing, encryption, digital signatures, and digital certificates. Cryptography dates back to Egyptian hieroglyphs carved into the pyramids and other Egyptian artifacts. They are necessarily designed to be secret, but they intrigue anyone who wants to read them. If you don't understand the glyphs, you won't be able to understand the code. It's similar to cryptography today. Unless a person has a key to unlock the code, they are left with ciphertext. Julius Caesar invented one of the very first substitution ciphers. It was a simple digit shift. The letters of the alphabet were shifted according to a predetermined number known only to those involved in the conversation. The Scytale was another early device used for cryptography. A leather strap was wrapped around a stick of a specific diameter. The message was then engraved on the leather. If the message was intercepted, the leather strap was useless without the stick of the specified diameter. Cryptography was used during both world wars. The Germans had the Enigma machine which allowed them to communicate securely with other German forces. It was very difficult to crack, but eventually the code was cracked. The United States and other Allies used several Native American tribes to use their native languages ​​to convey messages. The Navajo were very popular because of their language... middle of article ...... the methods discussed in this article will ensure that the company has done due diligence in its efforts to secure the data. Works Cited Kahn Academy (2013, February 21). Diffie-Hellman Key Exchange (Part 2) [Video file]. Retrieved from https://www.youtube.com/watch?v=dRUVG7YI1_kKhan Academy (February 21, 2013). Diffie-Hellman Key Exchange (Part 1) [Video file]. Retrieved from https://www.youtube.com/watch?v=ko62sibi668Kahn, D. (2008). The Navajo ¡°Windtalkers¡± by David Kahn. Retrieved April 11, 2014 from http://david-kahn.com/articles-navajo-windtalkers.htm Kulkarni, S., Chole, V. and Prasad, PS (2014). Review of authentication mechanisms for digital signatures used for certification. International Journal of Computer Science and Mobile Computing, 3(2), 735-738. Whitman, ME and Mattord, HJ (2011). Information security principles. Boston: Technology Classes.