This website uses cookies to ensure you have the best experience. Learn more

Cryptography In Computer Systems Essay

1398 words - 6 pages

The use of e-commerce in business motivates the issue of data and information security with computer networks. Common goals of protecting confidentiality, integrity, avail abilities of information are areas in the field of data loss and prevention. Data loss avoidance is divided into two areas: 1. Privacy Enhancing Technologies (PET) 2. Cryptography. The PET architecture contains anonymity, identity management, privacy policy, tabular data, and social network analysis. Cryptography is method of keeping data secure when transfer over networks by using ciphers that prevent unauthorized people from using it. The most prospective modern day cipher is the open key system. An algorithm named the RSA is the basis for most all the Internet security transactions and is a mathematical foundation for all open key systems. Data loss is minimized by adopting PET methods and cryptography in computer systems.

Privacy Enhancing Technologies have been refined over the past 10 years. The following paragraphs discuss and review these technologies.

Communications anonymity and anonymizers systems seek to remove the identity of the person sending the information through the Internet. These consist of systems that protect the IP address and other network address from the communication partners. The most popular software is Freenet. Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is. Freenet's main attraction is parents who have children and don't want their identity exposed to other people on the Internet. Other uses make it difficult for governments track them on the Internet. This is useful for people who have oppressive governments and some countries make the use of Freenet illegal.

Identity management services use the anonymity method and add attributes to establish pseudo credentials that can be removed from the Internet. Some systems are developed to use this idea in commercial projects. Perhaps the easiest method of understanding the pseudo credential is creating a free e-mail with a provider such as During the creation process, registration is up to the user to create the identity. The person types in a fake name and address then a pseudo credential is available for use on the web. By using a anonymizer such a re-mailer when sending out e-mail's the pseudo credential is completely hidden.

Recent research is to develop privacy policy languages that allow users to set the privacy controls they desire. Such privacy policy languages encode their data in a machine readable XML format. An example of this is the P3P Platform for Privacy Preferences. The XML file settings are used to automatically determine what type of information to release to other users on the Internet. The technology aim is to enable distributed systems to enforce a common privacy policy and allow users to discover and reason about the information...

Find Another Essay On Cryptography in Computer Systems

Discuss measures companies need to take in order to prevent computer systems failure

1370 words - 6 pages Hackers have thousands of tools at their disposal to take advantage of you including tools such as keystroke loggers. Keystroke loggers record every single keystroke you type on computer this includes private email messages, bank account password, and credit card number. Most computer users don't give security a second thought but the reality is that failure to take some simple steps could result in identity theft or worse. If connected

Cryptography is Essential for Information Systems

754 words - 3 pages important, and cryptographic functions can be found in more places, doing more things.” (Morar, Chess, & Watson) As the commerce and communication continue to move, forward with computer networks the use of cryptography will become more vital. “The cryptography now on the market does not provide the level of security it advertises. Most systems are not designed and implemented in concert with cryptographers, but by engineers who thought of

Protecting Data through Encryption

1149 words - 5 pages encrypted information. The algorithm developed by the French computer scientists and math – ematicians does not pose a threat to current cryptography being used by credit card and ecommerce companies. (Anthes, 2014) Even though the current cryptography being used is not threatened by the new algorithm it does show that groups are constantly working on algorithms to crack the cryptography protecting data therefore advances have to continue in

Cryptography and Basic Security Goals

950 words - 4 pages received by the specified party, so the recipient cannot claim that the information was not sent. Communication systems are widely interconnected and interdependent and use the same technologies to create a uniform digital world. In this era of digital information system resources are not safe from attacks. Public and widespread use of digital tools in communication quickly causes the creation of secure mechanisms. Cryptography technique is one

Cryptography and Network Security

1476 words - 6 pages that exist today. With each different algorithm come their advantages. PURPOSE, USE & ADVANTAGES OF CRYPTOGRAPHY Cryptography is used to protect data or information from any theft or possible alteration. It can also be used for types of authentication, such as user authentication. Cryptography is widely used in mobile phones, banking, Internet, corporate computer security, home computing, and also satellite TV. Cryptography is vital when


779 words - 3 pages 2.1 Introduction Cryptography is an interesting field in the world of computer security. This has been boosted by the increase in computer attacks emanating from the Internet. With large and confidential data being transferred over the Internet, its security must be addressed. It is because of this that encryption techniques are continually evolving. With computer hackers being IT experts who are hungry to get at personal data on the Internet

Should You Use PGP?

1465 words - 6 pages the past, had devastating consequences giving one side the upper hand in winning wars. Cryptography has long been performed by individuals with specialized talents. Encryption systems are often very complex and often difficult to comprehend. At present the type of cryptography we use has moved into the digital arena.With as many individuals using computers these days and all of the personal information everywhere the need for encryption standards

On the development of Quantum Computers and Cryptography

1526 words - 7 pages -- fundamental problem in computer security today. Society can not avoid quantum cryptography and the potential for dangers it poses. Companies should not fight against the cause, they should instead prepare. Slowly but surely, the evolution of technology will outdate RSA cryptography, and as the world advances, the industry must do the same. Engaging in a collective effort, businesses must put into place new systems relying on quantum key

A Brief History of Cryptography

2335 words - 9 pages ). Cryptography is used everyday in a variety of ways. Banks use it for PIN cards, mobile phones use it with calls and texts, satellite TV uses it as well as any home computer with Windows software (“Careers” 1). Starting with basic terminology, cryptography is as stated the science or study of secret writing. In the digital world, this means that anything meant to be private, such as emails or credit card numbers, is encrypted so that only


681 words - 3 pages know the connection is no longer secure (13). The law of physics states that in order to make a measurement on light, a disturbance must be made (13). This means that it would be impossible to intercept the secret key without alerting the sender and receiver. Public-key encryption relies on the trust that the computationally difficult problem used to share the key is too strong for any computer out there to break (13). However, photons are not made for long distance use (13). In order for this quatum cryptography theory to work for everyone, the range would need to be much larger.

The History and Applications of Cryptography

1612 words - 7 pages Cryptography is the study of secure or secret communications. Cryptography has been around for thousands of years. Cryptography has been around for thousands of years. Cryptography deals with authentication, confidentiality, and integrity of data. There are many different implementations of cryptography in information systems. This paper will cover hashing, encryption, digital signatures, and digital certificates. Cryptography dates back

Similar Essays

Future Trends In Computer Systems Essay

530 words - 2 pages Future Trends in PAGE \* MERGEFORMAT 1 Running head: FUTURE TRENDS IN COMPUTER SYSTEMSFuture Trends in Computer SystemsDon CarterGrand Canyon UniversityFuture Trends in Computer SystemsIntroduction: It is no secret that trends and developments regarding computer systems move at an incredible pace. It seems that every couple of years there is new groundbreaking technology and software changes. It was not that long ago that having a hard drive

Jobs In Computer Science: Video Games Vs. Computer Systems

1889 words - 8 pages Computers are everywhere. Almost everything that uses electricity has a computer inside it. The industry is growing fast, too. The computer in your phone is more powerful than the computer systems that put a man on the moon. Computers are used for everything from entertainment, such as gaming; to work, such as compiling financial records and rendering architectural models. As the field of information technology continues to grow rapidly

Field Assest Services In Computer Systems

625 words - 3 pages The primary objective of AFAS is to utilize the information available during faulted scenarios for efficient utilization of resources to quickly respond to the event and monitoring protective device operations to improve the system reliability. In order to achieve this, AFAS strives to:  Efficiently use of resources and data: Installation of new equipment should be kept to a minimum in order to enhance the economic benefit from this system

Questions Of Ethics In Computer Systems And Their Future

4883 words - 20 pages for you to read. If you real lazy you could haveyour computer read it to you in a smooth digitized voice that you've selected. After finishing inyour computerized bathroom that not only knows how hot you like your shower but alsodispenses the right amount of toothpaste on to your tooth brush. After dressing from yourcomputerized closet that selected all your clothes for the week, you'll enter your computerizedcar which is all activated by your