Cryptography And Network Security Essay

1476 words - 6 pages

Cryptography is the science of writing in secret code and is an ancient art. Cryptography has a long and fascinating history. Its use has been traced back to as early as 4000 years ago. Cryptography was used as a tool to protect national secrets and strategies. To understand the subject of cryptography, its history must also be explored. Cryptography exists in many different forms. There are many cryptographic algorithms. There are a numerous amounts of different types of cryptography. All these different types of cryptography have reasonable uses in the world. One key area where cryptography is used is in network security.
HISTORY & TYPES OF CRYPTOGRAPHY
The history of cryptography is outstanding. Cryptography has been dated back to 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Cryptography is the art of protecting information by transforming the data into an unreadable format. This is known as cipher text. The encrypted data can now only be deciphered, or decrypted by those who possess the secret key. A summary of this is that cryptography allows information to be transformed into a manner which the access to it can be limited by choice. Cryptography exists in many deferent forms. Various different kinds of cryptographic algorithms exist. There are several ways of classifying cryptographic algorithms.

SECRET KEY CRYPTOGRAPHY (SKC) – Uses a single key for both encryption and decryption
Secret Key Cryptography utilizes a single key for both encryption and decryption. The sender of the information uses the key to encrypt the plaintext and then sends the cipher text to the receiver of the information. The receiver must also have the same key to be able to apply it to the information and decrypt it to recover the plaintext. Due to the fact that only a single key is used for both encryption and decryption, Secret Key Cryptography is also known as Symmetric Encryption or a Symmetric Cipher.
SKC Algorithms Used Today: Some of the common SKC Algorithms in today’s use
• Data Encryption Standard (DES) – Most common SKC method used today. DES was originally designed by IBM in the 1970's. It was later adopted by the National Institute for Standards and Technology in 1977 for commercial and unclassified government applications.
• Advanced Encryption Standard (AES) – AES uses an SKC method using a block cipher designed by Belgian cryptographers. The algorithm uses a variable block length and key length. It allows any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits.
• CAST-128/256 – Is a DES like substitution-permutation algorithm. It employs a 128-bit key operating on a 64-bit block. CAST-256 is an extension which uses a 128-bit block size and a variable length key. CAST-256 was one of the Round 1 algorithms in the AES process.
PUBLIC KEY CRYPTOGRAPH (PKC) – Uses one key for encryption and another for decryption
Public Key Cryptography has...

Find Another Essay On Cryptography and Network Security

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages Steps to Effectively Respond to a Security Incident and Threats on a Wireless Network Incident response is usually one of those security areas that tend to be impromptu—companies don't think about it until they have to. But that needs to change. In this paper I will discuss five steps - identification, containment, eradication, and recovery and follow up a business use to effectively response to a security threat and I will suggest four

Investigation of Network Security Requirements and their Impact on Performance with the aim of establishing configurations fit for the purpose

1015 words - 5 pages software such as Microsoft project on a server and therefore, enabling every one that has access to the server to use the resource. This saves the organization expenses as they don’t have to buy separate licenses for every user’s computer. However, this great development has led to a number of security threats and challenges in the organization from outsiders through intrusions, once hackers identify a loop hole in the network they can be able to

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages other's files and see how far they can penetrate into a system. It is pure enjoyment for these hackers to explore a new computer network. It becomes a challenge to gain access to strange, new networks. They often argue that they are only curious and cause no harm by merely exploring, but that is not always the case.Where did my homework files go? Who is making charges to my credit card? Sounds like someone is out for revenge. Computer have become

This essay is about secruity risk List four possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist

1481 words - 6 pages Question 1a. List four (4) possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.There are 4 possible security risks that the bank and the clients are facing in the present network setup.Firstly, there may be a possible security risk of interception occurs. Interception means that unauthorized party gain access to an asset. Because client send their

Cryptography is Essential for Information Systems

754 words - 3 pages Cryptography has a powerful tool used with computers and the computer network security. This paper will explore the threats, the can and cannot do the threats, system design, implementation, state of security, etc. All systems using cryptography for authentication and privacy with the strongest cryptographic can still be vulnerable with upstream and downstream threats. The secure session of the authentication will require the secure user to have

Protecting Data through Encryption

1149 words - 5 pages to be cracked separately making it more time consuming to crack the algorithm. The idea of sub-computations of algorithms will greatly increase the security of data being transferred and put many organizations that have many traveling employees at ease. With employees traveling it is impossible to ensure that every network is secure and in most cases when traveling the network used to gain access to the internet is not. When a network is not

Key Management for Multicast Groups using Broadcast Encryption and Group Key Agreement

583 words - 3 pages , field test of quantum key distribution in Tokyo QKD network [8] was built to demonstrate eavesdropping attacks over unconditionally secure TV meeting system. Therefore, management approach, VPN technique and one-time pad encryption are necessitate basic concept of its security network model. Nevertheless, quantum cryptography technology is the promising solution for absolute secrecy in long term unconditionally secures cryptosystem. There are

Cryptography

779 words - 3 pages 2.1 Introduction Cryptography is an interesting field in the world of computer security. This has been boosted by the increase in computer attacks emanating from the Internet. With large and confidential data being transferred over the Internet, its security must be addressed. It is because of this that encryption techniques are continually evolving. With computer hackers being IT experts who are hungry to get at personal data on the Internet

Should You Use PGP?

1465 words - 6 pages folder security, protection for IM sessions, batch file transfer encryption, and protection for files and folders stored on network servers." (1)The benefits of using cryptography to secure personal information far outweighs the complexity of the application, but convincing people to use encryption consistently is a bigger issue. Installing and configuring a Microsoft Windows based PGP encryption application can be easy thanks to detailed

On the development of Quantum Computers and Cryptography

1526 words - 7 pages On the Development of Quantum Computers and Cryptography In 2010, the United States government, after accessing encrypted files by means of physical intervention, exposed ten Russian sleeper agents; in 2013, the United States government, without any means of physical intervention, surreptitiously collected and promptly decrypted many previously encrypted (Wood). Within this decade, concerns regarding the dubious security of

Networking: Network Security

2472 words - 10 pages Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. 2014. Network Security Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. [ONLINE] Available at: http://www.k2esec.com/secure-communications/network-security-protocols-ipsec-vs-tlsssl-vs-ssh-part-ii. [Accessed 25 March 2014]. Barrett, D. J. and Silverman, R. E. 2001. SSH, the secure shell. Cambridge [Mass.]: O'Reilly. Oppliger, R. 2009. SSL and TLS. Boston: Artech House. Stallings, W. and Stallings, W. 1999. Cryptography and network security. Upper Saddle River, N.J.: Prentice Hall. Rescorla, E. 2001. SSL and TLS. Boston: Addison-Wesley.

Similar Essays

Cryptography And Basic Security Goals Essay

950 words - 4 pages of them. Cryptography is the basic encryption method used in implementing security. The word cryptography comes from the Greek word "Kryptos", that means hidden, and "Graphikos" which means writing. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, the science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role

Cryptography And The Issue Of Internet Security

937 words - 4 pages immediately apparent in their content and no decryption is involved. Sources Cited Anonymous. Introduction to Cryptology. http://www.cs.brown.edu/. 2002. Computer Reseller News. Cryptography Is The Key To Intranet Security Needs, Computer Reseller News, 30 Jun 1999. M2 Press Wire. Hewlett-Packard: HP to make electronic world safe for Internet business, M2 PressWIRE, 2 Mar 2000. Menefee, Craig. US Encryption Policy Stagnating Says Pioneer Diffie, Newsbytes News Network, 10 Oct 2001.

Network Security And Nsa Essay

1945 words - 8 pages Network security has been a growing issue for decades now and it will always continue to grow as long as technology keeps enhancing. It is pretty common for big name companies to have impeccable network security. Obviously, this is needed because of the constant threat of hackers. Network security has a lot of the same characteristics as internet security because without networks there wouldn’t be an internet. So, if I start talking about

Network Security And Protection Essay

1544 words - 7 pages Intoduction Network security is a set of different measures which are designed to protect networks from attacks and unauthorised access. Network protection is provided in two type software and hardware. Treats to huge corporation networks nowadays are constantly growing, they spreading in increasing speed, and their destructive capabilities are increasing every day. If we look on the list of threads what may harm the corporate network, it