Monday, June 10, 2019

Cryptology Essay Example | Topics and Well Written Essays - 2000 words

Cryptology - Essay ExampleFurthermore, the user of interconnected com roamers and breakthrough is file and system sharing, make in-person information and data even more vulnerable to these threats. At this point steganography fits in perfectly to address the above issues accordingly. At the base of each internet communication and data gage lays cryptology that serves as the foundation to security and data authenticity. Cryptology ensures data and information confidentiality by ensuring in the import that the data in intercepted, the eavesdropper will not understand the content. In addition, Data authenticity is ensured and the message recipient is assured the message is from the correct sender. Finally cryptology ascertains data integrity by providing specific produce that the data or information received is not subject to an alteration by third party. The learn below demonstrates a basic outline of cryptanalysis process (Koblitz 2004). Background Cryptology can be defined as the study of cryptosystems, is simply put understanding how to uniquely hide a document or relevant information in plain sight. Normally this involves using a secret encryption that only the intended recipient understands. In a nut shell, cryptography is trying to understand how to pass private information in a popular arena which in this case in the internet. This study is further subdivided into two distinct yet similar fields. steganography involves the design, creation and implementation of cryptosystems (Bauer 2006). These are the codes and colonial formulas used to hide the information before or during data transfer. In addition, cryptosystems also includes measures and mechanisms of incorporating digital signatures in documents. Digital systems basically act as proof of ownership of digital content otherwise susceptible to alterations. On the other hand, cryptology also deals with cryptanalyses which studies the decoding of cryptosystems. Research data analysis and outlin e ii basic methods were considered for the purposes of this research. Quantitative research, where collected data is expressed in mathematical figures then evaluated for appropriate results, and qualitative which does not involve figures but rather experiences of participants and the literal data obtained from various sources. In this instance, qualitative analysis best suited thit type of research and was extensively applied. The primary data sources included case studies and civilize observation of crypto systems at work. In addition, secondary sources such as books, library articles and the internet provided a reliable reference point. Literature review tally to Bauer (2006) cryptography is a field of study where systems and data security meets the power of mathematical functions and equations. Based on his research, cryptology and by extension cryptography offers to the world of security engineering tools that underlie and form the basic and modern security protocols. Buchma nn (2004) adds on this analogy through his research that offers an insight to cryptography and the techniques involved in cryptanalysis. According to him cryptography is a key to distributed systems security and modern day data integrity. Buchman argues that powerful as it may be, cryptology has often been misconstrued by experts because of the various malpractice associated with it. Cryptography has often been used in the wrong arena to protect the wrong information, and pass illegal messages throughout time. Another

No comments:

Post a Comment