Wednesday, February 27, 2013

Cryptography

Networking Security Fundamentals

CIS 333





Term Paper

Show case: Cryptography














Submitted in partial tone Fulfillment of the Requirements for the

Bachelor in Information Systems

Concentration in Computer Security



Strayer University

March, 2010




Cryptography is a small warfare cry that means a lot in the IT world. There are many aspects to security and many applications, ranging from true(p) commerce and payments to hole-and-corner(a) communications and protecting passwords. One essential aspect for secure communications is cryptograph. Cryptography is the science of writing in secret code and is an ancient art; the first documented purpose of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scriber used non standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously manytime after writing was invented, with applications ranging from diplomatic missives to war time battle plans. It is no surprise, then, that new forms of cryptography came in brief after the widespread development of computer communications.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

In entropy and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes meet about any network, particularly the Internet. Cryptography, then, not only protects info from theft or alteration, but can also be used for user authentication. There are in general, cardinal types of cryptographic schemes typically used to accomplish these goals: secret happen upon (or symmetric) cryptography, public- rudimentary (or asymmetric) cryptography, and hash functions. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn usually be decrypted into in operation(p) plaintext.
In secret key cryptography, a single key is used for both encryption and decryption. The sender uses the key, or some set of rules to encrypt the plaintext and sends the ciphertext to the receiver. The receiver...If you want to get a sound essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment