- Discover essay samples


4.9 of 5.0 (102 reviews)

1606 words

Cryptography Page 1
Cryptography Page 2
Cryptography Page 3
Cryptography Page 4
Cryptography Page 5
Cryptography Page 6
The above thumbnails are of reduced quality. To view the work in full quality, click download.


Cryptography is the science of encoding a message into a form that is unreadable and making sure only the proper people are capable of decoding the message back into its original form. This is usually done by using an encryption algorithm and a decryption algorithm (these two are often the same) and very often a secret key. Some of the early cryptographic systems did not use a key but instead kept the algorithm itself secret. The message sender uses the encryption algorithm and the key to encode the message, and then sends it to the receiver. The receiver then uses the decryption algorithm and the key to turn back the encrypted message into its original form and read it.

If the message is intercepted on the way by a third party, they will only have unreadable data and will have gained nothing, unless they can figure out the decryption algorithm and obtain the key. This is why the key is never to be sent with the message, and has to be kept secret at all cost. If the key is compromised, the sender and the encrypted data is no longer safe. The sender and the receiver then usually agree on a new key to prevent any further damage.

In ancient Greece, around 550 Bc, messages were sent encoded to generals and could only be decoded using special staff keys. The key actually consisted of a physical object, which was applied on the message to get the decrypted version of it. In 50 Bc., one of the most simple cryptographic algorithms ever used was the one called the Caesar cipher, that was used by Julius Caesar to send messages to his generals. It consisted simply of switching each letter with the letter that was 3 letters further down the alphabet.

For example "Stephen" would become "Vwhskhq". To decrypt the message, the receivers would simply subtract 3 letters from each letter. This algorithm was later improved and called ROT13, where the letters could be shifted to any number between 1 and 25, and the number of letters shifted was the secret key. This very simple algorithm has been used on Usenet successfully to prevent people from inadvertently reading materials they might find offensive.

Monoalphabetic substitution is another simple step away from the ROT13 algorithm. In this algorithm, each letter correspond to another letter but in no particular order. For example a = d, d = x, f = e, etc for all 26 letters. This made it much harder to break but also made fairly big keys that couldn't be memorized, since they consisted of 26 pairs of letters.

In France during 1585, members of the king's court liked to send romantic or gossip messages to each other and encrypt them for safety, which becomes almost a necessity. Blaise de Vigenere came up with a poly-alphabetic substitution known as the Vigenere cipher. Basically, the algorithm would encrypt messages several letters at a time instead of letter by letter. For example ab = fh, th = sq. To simplify the huge keys it would require, the key was broken into a table and a key, the table was fairly big but the key was small enough to be memorized, and the table was useless without the key. This cipher wasn't totally safe but no totally sure method to break it was developed before early in the 20th century.

During World War I, American troops used native Indians to send messages over the radio, which could only be understood by other native Indians, and absolutely nobody in Germany could understand it. Also in World War I (most cryptographic algorithms are developed for wars), the Playfair algorithm is developed by the Allies, the key, like in the Vigenere cipher, is based on a little table and a short keyword, which were both changed periodically. The rules used with the table were much more complex and made it fairly safe.

In World War II, however, the Germans gave up on abstract algorithms and came up with a physical encrypting/decrypting machine called the Enigma. It had different wheels of different sizes which were to be tuned differently depending on the date, the different turnings were listed in a little booklet that came with the machine. It wasn't broken before the Allies finally managed to capture enough pieces of the machine and collect enough data from operating errors by the Germans.

Whitfield Diffie and Martin Helbman (1976) come up with the notion of Public Key Cryptography. In 1977, RSA (Ronald L. Rivest, Adi Shamir and Leonard M. Adleman) develops a Public Key algorithm based on large prime numbers that is theoretically impossible to break in a reasonable amount of time. Digital signatures were also made possible.

1991, PGP (Pretty Good Privacy) reuses an algorithm very similar to RSA's and gets posted on the web. Phil Zimmerman gets sued for both exporting cryptographic data and violating copyright laws. A new version of PGP is quickly developed which is different enough from RSA's to be marketed. Because of its broadcasting on the web and the fact that it is freeware, PGP becomes one of the most widespread crypto systems.

Now, we will quickly go over the concepts of public key cryptography and the global idea of how the RSA algorithm works (or PGP, they are almost the same), as well as digital signatures and ?digicash?. I will also explain the general methods used to break most ciphers. I cannot however explain in detail because I cannot broadcast that kind of information without breaking the law which I will explain later.

Public Key Cryptography

The main problem with most cryptographic algorithms is that they are vulnerable to having the key exposed, and the key has to be agreed on by the sender and the receiver ahead of time. This means that when the sender and receiver exchange keys the first time, there is an opportunity for a third party to capture the key (or whenever keys are changed, in many cases keys were changed periodically for additional safety). This is exactly what public key cryptography avoids. The receiver of the message sends his public key to the sender. It is a public key, so it doesn't matter if the whole world knows the key or not. The key can only be used to encrypt data, not decrypt it. Then the sender will encrypt the message with the public key and send it to the receiver. Once the receiver received the data, he takes his private key and uses it to decipher the data. Note that the private key was never transmitted by the receiver to anyone, so it is almost invulnerable to exposure. Also note that the public and private keys work in pairs. There is only one private key associated with each public key and vice versa, and ideally it is impossible to find one key from the other one.

If someone intercepts the message he gets only an unreadable encrypted version of it, and using the public key or any other incorrect key used with the decryption algorithm will simply generate another series of numbers. If the receiver wants to reply to the sender, the sender has to have his own set of private and public key as well, and then the whole story goes on again the other way around. Ideally, there is even a phonebook of all public keys so that anybody could send an encrypted message safely to anybody else by simply looking up that person's public key.

The RSA Algorithm

The RSA algorithm is based on large prime numbers. One very interesting property of large prime numbers is that it is very hard to find out wether a very large number is a prime, and if it is not, finding out what numbers it is a product of can be very hard too. So if we take two (very) large primes and multiply them together, we get a number that is almost prime, and it will be very hard to find what two numbers were originally multiplied to obtain it. These numbers are used as the public and private keys, since it is very hard to find them. Theoretically, if the keys are chosen large enough, breaking the RSA algorithm would take several hundred years using all the biggest computers on the planet put together. RSA has offered a large amount of money to whoever comes up with a reliable and fast algorithm that can break their code. They still have all their money.

Digital Signatures

There remains one problem with passing all these messages: messages can be passed from sender to receiver safely, but the receiver has no means of determining who the message was actually from. For example, Bob could take Joe's public key and send the following message to Joe: "You're a wuss. signed: Jack". Now, when Joe receives this message, he has absolutely no way of telling that Bob sent the message, and not Jack.

This is where digital signatures come in handy. They allow a person to sign a message in a way that certifies that the message was actually sent by them. This is done by using one other interesting property of the private and public keys in RSA: they can be reversed in the ...

You are currently seeing 50% of this paper.

You're seeing 1606 words of 3212.

Keywords: cryptography meaning, cryptography and network security, cryptography in computer network, cryptography in cyber security, cryptography and network security notes, cryptography python, cryptography algorithms, cryptography meaning in hindi

Similar essays

Internet site evaluations

Introduction "Wow, will you look at this website I found, they claim that 9 out of 10 people in America are millionaires. What's more, they claim to be the largest online wealth creation firm. Surprisingly, there is no information regarding the author or the origin of this site." Internet dream or website scheme? If one is easily pers...

32 reviews

TABLE OF CONTENTS Introduction . . . . . . . . . . . . . . . . . . . 1 Methodology . . . . . . . . . . . . . . . . . . . 6 What is the Computer Underground? . . . . . . . . 11 Topography of the Computer Underground . . . . . . 20 Hacking . . . . . . . . . . . . . . . . . 20 Phreaking . . . . . . . . . . . . . . . . . . 21 P...

143 reviews
F117 nighthawk stealth fighter

F117 Nighthawk Stealth Fighter Introduction My paper is on the F-117A Nighthawk Stealth Fighter. I am doing this research on an account of the Nighthawk being an interesting, modern, and technological subject. Some may confuse this fighter with the B-2 Stealth Bomber. The B-2's construction was provoked by the Nighthawk due to the...

92 reviews
Warfare technology

In today's world war plays a very important role in people's lives. Some of these wars date as far back as the Roman Empire and Alexander the Great, while others are just being born and brought to the doorstep of the world. In 1939 this world was introduced to World War II. Although this war was based in Europe, it would touch the lives of p...

164 reviews

This isn't perfect but it is a good start Who is supposed to be the watchdog on the net? This question will raise the temperature in almost any room. The government already has to many regulations on lots of things, who wants Uncle Sam's hand in the web. Some of the regulations that are applied are there for specific reasons. Those protect th...

176 reviews
Computer Mouse

The computer mouse is an input device that uses a graphical user interface. Computers that incorporate the graphical user interface into their system are able to use the computer mouse to maneuver around the computers different applications. The mouse is used in many different applications including engineering and computer games. When using...

165 reviews
Technology and the stock market

The purpose of this research paper is to prove that technology has been good for the stock market. Thanks to technology, there are now more traders than ever because of the ease of trading online with firms such as Auditrade and Ameritrade. There are also more stocks that are doing well because they are in the technology field. The New York Sto...

134 reviews
Privacy and anonymity and information network technologies

We might assume that nothing new could be said about the issue of privacy behond the basic notion that it is something secluded from the inclusion of others, a virtue and right that every citizen of a democratic society might possess. However, if that were actually the case then we would not see our culture involved in debates about th...

29 reviews
Bridge Structures

and The Use of Geometry in Their Design What is a bridge? A bridge is a structure providing continuous passage over a body of water, roadway, or valley. Every bridge looks different from the another. Their bridge structure is different. There are nine types of main bridges. Bridge engineers use a lot of geometry to help them design t...

42 reviews
Power generation in the future what we should do in australi

Based on the current technology regarding power sources we believe that Australia's total power usage should be divided between these four sources using the percentage specified (reasons why are listed below): Nuclear Power ' 50% Coal Power ' 25% Solar Power ' 15% Wind Power ' 10% Nuclear Nuclear should generate majority of t...

120 reviews
Computers in our society

Don?t know anything about computers? Don?t think they are a big part of your life? Think again! Computers are wondrous machines that improve our lives in many areas like education, entertainment, and work.(Paragraph)The use of computers in and out of school has made improvements in the way we learn. For instance, ?the use of computers in the cl...

58 reviews
Green architecture

Green Architecture is an approach to building which has become more popular in the last 25 to 30 years. Also known as sustainable design, green architecture is a method of design that minimizes the impact of building on the environment. Once thought of as unconventional and nonstandard, both regulatory agencies and the public ali...

145 reviews
Noise reduction in hearing aids

Recently in a local hearing clinic, a client's concerns were discussed. 'I'm afraid I won't like them. My brother in law bought two hearing aids, and he keeps them in a drawer in the kitchen.' While the number of people dissatisfied with their hearing aids hovers around 50%, the hearing aid industry is hard pressed to decrease the number of...

86 reviews
Integrated software application

Current copright and patent laws are inapropriate for computer software; their imposition slows down software development and reduces competition. From the first computer as we know them, the ENIAC, computer software has become more and more important. From thousands of bytes on miles of paper to millions of bytes on a thin piece of tin foilsan...

173 reviews
Atsisiųsti šį darbą