Decrypting Cryptography Essay

1881 words - 8 pages

Decrypting Cryptography

Cryptography is the study of techniques and implementation dedicated to the solving of complex problems. Today, its primary use is to protect sensitive information by maintaining the privacy of communications. In general, the secret information is transformed into an altered text by a process referred to as encryption, thus preventing the message from being read by anyone besides the intended receiver. It is this cipher text that is transmitted to the intended recipient, who must use the proper key to reverse the process, that is convert the encoded message back into its plain text form. Cryptography has seen a recent rise in popularity due to the expanding nature of communications technology, the Internet, and the inherent security needs of such systems.

Cryptography has many practical uses besides providing a code for secret communications. A major contributor to the many current applications of cryptology is the status of computers. Cryptology provides the tools to create a large-scale network of individuals who can communicate with each other confidentially without the threat of an unintended party being able to receive the transmission. The electronically intangible nature of e-mail messages makes them particularly susceptible to attack. Cryptography provides encryption for e-mails, so that only the intended recipient can access the plain text.

Cryptographic applications have been augmented with the recent increase of business conducted over the Internet, otherwise known as e-commerce. Online banking, brokerage accounts, and shopping have increased the need for protection against fraud, theft and corruption of the vital information that is sent via the Internet with each electronic transaction [2]. Cryptography is used to encrypt the credit card number along with any other private data before it is sent through the World Wide Web. Only the retailer or web-server maintains the ability to decrypt the data, thus preventing unwanted parties from viewing the sensitive information. Currently, the most commonly used cryptographic mechanism in the technology industry is the RSA public key encryption scheme, which is integrated into operating systems and software packages by Microsoft, Apple, Sun, Lotus, Netscape and others [5].

[2]

Ronald Rivest, Adi Shamir, and Leonard Adleman developed RSA in 1977. RSA, which stands for the first letter of each inventor’s last name, is a public-key cryptosystem, which means that the cipher text and the way it is encrypted are not kept secret [1]. Despite this amazing feature, the code remains nearly impossible to break. RSA Data Security, now a subsidiary of Security Dynamics, which owns RSA, cites “the primary advantage of public-key cryptography is increased security and convenience: private keys never need to be transmitted or revealed to anyone” [2].

The inability to crack the RSA cipher without the proper key relies on the difficulty of factoring large...

Find Another Essay On Decrypting Cryptography

Communication Reform Essay

2959 words - 12 pages export license. This regulation was in place in order to prevent reverse engineering of American products. This applies to the American communications industry because tight controls are kept over cryptography products in order to prevent them from being sold to nations who In turn might use our strong encryption protocols against the United States.However, regulation has recently fallen out of favor with much of the developed world. A good

Admiral Reginald “Blinker” Hall and Room 40

2479 words - 10 pages unrestricted submarine warfare, both sides were constantly looking for new strategies to implement. One of Great Britain’s most important naval developments was the founding of the top-secret Office of Naval Intelligence, better known as Room 40. Specializing in cryptography, “the science of writing in secret code” in order to hide sensitive information, Room 40’s cryptanalysts worked around the clock to break the secret code. Decryption is

Privacy - What about it? ... A comprehensive and easy to understand overview of public key cryptography and the main tool to apply it: Pretty Good Privacy.

5283 words - 21 pages through the process of generating a new key pair. Although you probably realized that these keys have some importance, you might not realize that these keys are the ins and outs of PGP.You generate a key-pair; a private and a public key. The private key you must absolutely keep to yourself, but the public key is just what its name applies; public! This scheme sound somewhat strange - I mean, the whole idea of cryptography and exncryption would be

Reality and Illusion in Shakespeare's Hamlet - Reality, Appearance and Deception

896 words - 4 pages Reality and Illusion in Hamlet   Shakespeare’s play, Hamlet, begins with the appearance of a ghost, an apparition, possibly a hallucination. Thus, from the beginning, Shakespeare presents the air of uncertainty, of the unnatural, which drives the action of the play and develops in the protagonist as a struggle to clarify what only seems to be absolute and what is actually reality. Hamlet's mind, therefore, becomes the central force of the

Sub-plots in Hamlet

1118 words - 4 pages Sub-plots in Hamlet   There are many things that critics say make Hamlet a "Great Work," one of which is the way that Shakespeare masterfully incorporates so many sub-plots into the story, and ties them all into the main plot of Hamlet’s revenge of his father’s murder. By the end of Act I, not only is the main plot identified, but many other sub-plots are introduced. Among the sub-plots are trust in the Ghost of King Hamlet, Fortinbras, and

Hamlet as Victim and Hero

1301 words - 5 pages Hamlet as Victim and Hero      Hamlet, Prince of Denmark, a Shakespearean tragedy, tells the story of Prince Hamlet, who gained the knowledge of a terrible incident that his kingdom had suffered. Claudius, the king of Denmark and Hamlet's uncle, had killed his own brother, the king, who was also the father of Hamlet, and married his brother's widow. Hamlet suffered these traumas to a severe degree, and his only relief was to defeat his

Essay on Light and Dark in Antigone

1188 words - 5 pages Use of Light and Dark in Antigone   The "Golden Age" of Greece is noted for its many contributions to the creative world, especially in its development of the play. These performances strived to emphasize Greek morals, and were produced principally for this purpose. Antigone, by Sophocles, is typical. The moral focused on in Antigone is the conflict between physis (nature) and nomos (law), with physis ultimately presiding over nomos

charant Creon as the Main Character of Antigone

1231 words - 5 pages Creon as the Main Character of Antigone   Throughout the Greek play Antigone by Sophocles, there exists a dispute as to who should receive the designation of main character. Antigone, the daughter of the cursed King Oedipus, as well as Creon, stately king of Thebes, both appear as the key figures in this historic play. I believe that Creon, king of Thebes, should be considered the main character in this work of Greek theater. Three

Free Macbeth Essays: Sleep and Sleeplessness

525 words - 2 pages The Sleep and Sleeplessness Motif in Macbeth We have consciences that function to tell us the difference between right and wrong. If we have clear consciences, we usually possess the ability to sleep. But when our consciences are full of guilt, we experience a state of sleeplessness. In Macbeth, Shakespeare uses the sleep and sleeplessness motif to represent Macbeth's and Lady Macbeth's consciences and the effect Macbeth's conscience has on

Life Outside of Life in Hawthorne’s Wakefield

898 words - 4 pages Life Outside of Life in Hawthorne’s Wakefield   Efficacy lies at the heart of human desires for immortality. Characters throughout literature and art are depicted as wanting to step aside and see what their world would be like without their individual contributions. The literary classic A Christmas Carol and the more recent, but ageless, film It’s Wonderful Life both use outside influences (three ghosts and Clarence the Angel

Essay on Identity in Song of Solomon

2172 words - 9 pages Searching for Identity in Song of Solomon         Abstract: Whether Africans really fly or just escape a monumental burden, perhaps only through death, is a decision Toni Morrison has apparently left to her readers. Never the less, no matter what you believe, within Song of Solomon, the suggestion is, that in order to "fly" you must go back to the beginning, back to your roots. You must learn the "art" from the old messages.   O

Similar Essays

Should You Use Pgp? Essay

1465 words - 6 pages Encryption and cryptography have been in existence since the time of the ancient Greeks. Man has always had the need to hide information from some while at the same time allowing others to know what it means. Typically during times of war, encryption has been important to transfer important messages. While encryption is important in cryptography, decryption is held even higher because once the code is broken the secret is exposed. This has in

Impact Of The Internet On Information Technology Security

1185 words - 5 pages security, it does not adequately ensure safe. Unauthorized users such as packet sniffers can capture TCP/IP sessions (Computer Reseller News PG). No decrypting is involved so once the sessions are intercepted, their content is immediately transparent.CryptographyA very real risk exists in that individuals can gain access to various information types, personal or business related, and to information that is critical to a country. Cryptography, when

Explain The Main Developments In E Commerce Security

1748 words - 7 pages E-Commerce SecurityCoursework March 2004Jonathan Lelliott - A052956Part II - 1The RSA Algorithm is a form of asymmetric public key cryptography that bases its security in the difficulty of factoring numbers. For Eve to properly decrypt the message that she intercepted, she would normally require the private key of the intended recipient. The sender issues a public key to each intended recipient of the message who then use import it into their

Ethics Of Encryption Essay

2198 words - 9 pages be provided for all encrypted transmissions. If users of strong cryptography choose to use the Clipper Chip's technique, then the government is again given the permission to do as they please; however, users of other forms of encryption should not be forced to provide the government with a decryption key. "No person ... shall be compelled in any criminal case to be a witness against himself..." (Henick). This Fifth Amendment privilege stands