0% found this document useful (0 votes)
5 views

cryptography

Cryptography is a technology that secures data and communications through encryption and decryption, aiming for authentication, secrecy, integrity, and non-repudiation. It has evolved from ancient methods to modern techniques, including quantum cryptography, and is essential for protecting sensitive information in today's digital landscape. Despite its importance, cryptography must continuously adapt to new threats and ethical considerations in order to maintain security and trust.

Uploaded by

Angel Monares
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

cryptography

Cryptography is a technology that secures data and communications through encryption and decryption, aiming for authentication, secrecy, integrity, and non-repudiation. It has evolved from ancient methods to modern techniques, including quantum cryptography, and is essential for protecting sensitive information in today's digital landscape. Despite its importance, cryptography must continuously adapt to new threats and ethical considerations in order to maintain security and trust.

Uploaded by

Angel Monares
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Angel Grace G.

Monares

Cryptography

With the use of codes, cryptography is a technology that protects conversations and data
by limiting access to only those who are meant. It converts plaintext into cipher text and back
again using techniques like encryption and decryption. Authentication, secrecy, integrity, and
non-repudiation are its primary goals. Symmetric, asymmetric, and hash function cryptography
are the three categories of cryptography. Secure data transit across networks, credit card
transaction protection, and email privacy are all made possible by cryptography. It is essential to
computer network security in order to protect sensitive data and IT infrastructure. To produce
complex and secure techniques, cryptography combines computer technology, engineering, and
mathematics. It is crucial to computer network security in order to protect sensitive information
and the supporting systems.

Using keys and algorithms, cryptography is a technique for encrypting messages to


provide safe online transactions, data privacy, and digital communication. The word itself is
derived from the Greek terms kryptos and graphien, and it has changed throughout millennia.
The complexity of encryption rises along with people's ability to decipher encrypted messages.
The history of cryptography is intriguing since it spans many civilizations, including ancient
Mesopotamia, where in 1500 BC it was employed to hide a glaze recipe for pottery. An ancient
treatise called "Arthashashtra" by Kautilya, often called Chanakya, details how assignments for
spies were written in "hidden script" in ancient India. Comprehending the cryptography's past
and its significance in digital trust is essential for contemporary cybersecurity.

The ancient Greeks employed ciphers, which are methods of encryption or decryption, to
alter messages. During a battle in 100 BC, Julius Caesar communicated with the generals of his
army using a substitution cipher. The sixteenth-century Vigenère Cipher uses interwoven Caesar
ciphers based on the letters of a keyword to encrypt alphabetic text. Although the earliest record
of Blaise de Vigènere dates to 1553, his fame increased in the 1800s. In 1863, Friedrich Kasiski
managed to decipher the Vigènere encryption. The Hebern rotating machine, invented in 1917 in
Illinois, combined the electrical and mechanical elements of an electric typewriter with the
mechanical parts of a traditional typewriter to create the first encryption device to use electrical
circuits. Since ancient times, these ciphers have been used to alter messages and safeguard data.

Cryptography needs to be updated and improved continuously to keep up with new


threats, weaknesses, and technical developments. In an interconnected digital world, cooperation
amongst researchers, industry, governments, and standards bodies is essential to guaranteeing
strong cryptographic systems. Despite these difficulties, sustaining the efficacy of technology
still requires a focus on security.

By providing techniques like minimalism, supplying only the information that is


required, coordination, secrecy, authentication, and signatures, cryptography seeks to make
communication with enemies easier. Even in the presence of adversaries, these techniques aid in
building mutual confidence and coordinating activities toward a shared objective.

Two-step encryption and decryption procedures are used in cryptography, a technology


that originated in the Roman and Egyptian civilizations. It was extensively employed throughout
the American Revolution, the Second World War, and the First World War. The 'ATTACK' code
'CVVCEM' is one example. This essay offers a thorough analysis of cryptography, covering all
of its characteristics, advantages, and disadvantages.

The main defense mechanism of the majority of cryptographic systems is prevention,


which dissuades dishonesty, fraud, and misuse. A strong system should be able to stop attacks
and identify misuse in addition to providing defense. When used properly, strong cryptography
can be beneficial, but it is not a panacea. It's like defending a house with stakes if all you focus
on is cryptography methods and ignore other security considerations because smart opponents
can get around them.

Designing a cryptographic system is an art that demands striking a balance between


confidentiality, credibility, secrecy, safeguards, and access. For cryptographers to create safe
systems and spot weaknesses in pre-existing designs, intuition as well as expertise are essential.

The goal of cryptography is to design systems that preserve intended functionality in the
face of malevolent threats to break it.
Quantum cryptography applies the concepts of quantum physics in order to safeguard
handling of information, especially in secure communication, like sending private messages.
Only the specified receivers should be able to access the communications, according to
cryptographic requirements.

Cryptography is a vital tool in the digital age for protecting infrastructure, privacy, and
transactions against unauthorized access. It isn't flawless, though, and as technology advances, so
do the strategies and tools employed by adversaries. This continuous development emphasizes
the need of encryption as an undetectable barrier that safeguards the confidentiality and integrity
of our digital world.

Since cryptography is a tool for arranging power and ethical issues, it is inherently
political. In light of the Snowden leaks, its ethical and social position has come under evaluation,
raising questions about whether the field has handled mass surveillance properly or not.

A lot of items in public key are vulnerable, secure communication. Ultimately, it's a
necessary a component of programs that minimize identity internet fraud, theft, and other
cybercrime.

Using codes and ciphers to safeguard communication and information while making
clear, comprehensible signals incomprehensible to unauthorized parties is the art and science of
cryptography. Its foundation consists of the two fundamental processes of encryption and
decryption. The process of converting a message into cipher text—a garbled format—using a
secret key and a specific algorithm is known as encryption. This key serves as the secret sauce
that enables the encryption to be broken and the message to be returned to its original format, but
only those with authorization can access it.

Modern cryptography uses complex mathematical methods, such as the Advanced


Encryption Standard (AES), to increase security. Its strength comes from the length of the secret
key and the complexity of the encryption. It employs hash functions to ensure data integrity and
safeguards data during transmission, alerting users to potential manipulation.
Review of Related Literature

Ghosh, B., Aich, R., Khag, A., Nayak, S., & Kumar, P. (2020). Cryptography. Journal of
Mathematical Sciences & Computational Mathematics, 1(2), 225-228.

Goldreich, O. (2004). Foundations of Cryptography, Volume 2. Cambridge: Cambridge


university press.

Hojjati, A. (n.d.). The History of Cryptography. DigiCert.

Koblitz, N., & Menezes, A. (2010). The brave new world of bodacious assumptions in
cryptography. Notices of the American Mathematical Society, 57(3), 357-365.

Kotas, W. A. (2000). A brief history of cryptography.

Portmann, C., & Renner, R. (2022). Security in quantum cryptography. Reviews of Modern
Physics, 94(2), 025008.

Richards, K. (2021, September 27). What is cryptography? definition from search security.

Rivest, R. L. (1990). Cryptography. In Algorithms and complexity (pp. 717-755). Elsevier.

Robinson, P. (2013). Cryptography as a service. RSAConference Europe, 2013.

Rogaway, P. (2015). The moral character of cryptographic work. Cryptology ePrint Archive.

Schneier, B. (1998, April). Security pitfalls in cryptography. In EDI FORUM-OAK PARK- (Vol.
11, pp. 65-69). THE EDI GROUP, LTD...

Schneier, B. (1997, March). Why cryptography is harder than it looks. In EDI FORUM-OAK
PARK- (Vol. 10, pp. 87-90). THE EDI GROUP, LTD...

Sunila, D. (2023, September 30). Cryptography Challenges.

You might also like