Sie sind auf Seite 1von 8

What Is Cryptography?

February 11, 2013

In todays world where Information technology rules the world, there are many challenges in terms of storing information securely. Many people have a tough time storing their data in computers as well as other storage media. There are some well known methods of ensuring that stored digital data is secure and no unauthorized people can access it. A process known as cryptography is used to achieve this. This method usually uses coded messages. The methods used vary from electrical engineering, mathematics and computer science applications. Since computers are used on a daily basis and most of them are shared, stored data isnt much secure. To make it easy to secure your personal documents and information, the use of cryptography is required. Nevertheless, this method isnt used regularly. This process works just as humans do on a daily basis. Remember a time when you were talking with your friend or colleague and then someone rudely interrupts? What did you do? You used some coded messages so that the

intruder couldnt understand your conversation. Communication of this kind is also like cryptography. People who are more informed in computer science can tell you that computers work similarly in order to secure your information. The name cryptography is derived from the word crypto which is a Greek word for code. In todays world, cryptography is very significant as the world is heading towards becoming a Global Village through computing. When learning computer applications, you will find out that cryptography is a key part in the course. There are a number of parts that cryptography is divided into. You can find Public or symmetrical cryptography. Cryptography is commonly used in online banking and e-commerce. In these fields, there are passwords generated by users and cryptography is the process used to secure them. Mostly, the messages generated are coded and in case of any leakage, nobody would decode the message. The messages arent readable due to a process called encryption. Encryption involves converting plain text into encrypted text. Encrypted text cant be read by the human eye and this means your information is secure. Information is usually converted at the source and later reconverted at the receivers end so that its readable. Using this method, nobody can read the message during transmission. Before

this process is applied, the plain text is known as plaintext, through encryption, it becomes a ciphertext and finally decrypted to its original format with the aid of various encryption algorithms. In a professional setting, there are four main reasons for using cryptography, they include: Integrity- When sending someone a message, you need them to trust you and cryptography assures the receiver that the message hasnt been altered. Authentication- This is whereby you are required to prove your identity in order to deter unauthorized people from accessing your details Privacy- I have mentioned this earlier, when you dont want people to access your private data, you can use cryptography. Non-repudiation- This is a way to assure the recipient that the sender actually did send the message. Generally, there are three classifications of algorithms associated with cryptography, which are,

Hash functions- These algorithms are responsible for using mathematical transformations to encrypt data which is an irreversible process.

Secret key cryptography- The decryption and encryption process only requires a single key in this process. Public key cryptography- The decryption and encryption require different keys in this process unlike secret key cryptography. Hash functions Its also referred to one way encryption or message digests and in this case, algorithms do not require any keys. Instead of using keys, there is a hash value which is fixed in length. This hash value is then computed according to the plain text which in turn reduces the chances of the content being recovered. This is a method that is common with various operating systems and protects users passwords. Secret key cryptography Its also referred to as symmetric encryption due to the fact that it uses one key for both decryption and encryption. Public key cryptography The most common algorithms used today for digital signatures are RSA. RSA is the most popular and was created in 1977. There are special regulations laid down that make it hard for a hacker to read the information in a message.

Cryptography On Your Network


February 12, 2013

Network security should be one of the most important things to think about when planning to secure confidential information. Most large companies have set measures that deal with network security. For small and middle sized companies, its sometimes not easy to place the same kinds of measures. Nevertheless, you need to consider this due to a coupe of reasons. Did you know that large commercial organizations are required by the law to secure their data? The government knows well that sensitive data can easily be stolen or lost and therefore enforce this law. If you are running a small business, then you need to note the importance of data security for your organization. If a company loses sensitive information to any of the above causes, be it theft or natural disaster, wont it have a hard time moving forward? Some of the information that we would refer to as invaluable include, business outline, client and employee information. To ensure your organization is ran with integrity and confidentiality, then you need to make

sure these details are well secured. This sensitive information ensures that your business is running and once you lose it, you run out of business. The amount of damage that can be caused if a person decides to steal this information is way too much. If you dont have enough security measures for your data, then be aware that it can be compromised in one or more of the following ways. A physical attack Different people have different personalities and you can have a jealous employee in your organization that is out there to destroy the company. An employee can decide to destroy valuable data on purposes or steal it. The most common ways of securing data in corporations is the use of firewalls and hardware like routers. These routers and firewalls are responsible for protecting the valuable data by blocking any threats that come to the network. Unfortunately, these methods arent as effective as intended because most attackers will keep trying until they get what they want. The best thing with cryptography is that even if an attacker penetrates your wall of security, he is unable to decode the available data. Encryption was earlier used only in the military bases, but today its used all across the globe by institutions as well as individuals. A virtual attack

With the numerous viruses and worms available on the internet, its inevitable to get an attack as long as you are online. Malicious attacks happen each and everyday and therefore protecting your information would not only keep unwanted eyes off but also keep off malicious attacks. One of your competitors can as well use your employees to find a loophole through the security measures and finally get the sensitive data in his hands. Cryptography can reduce the chances of your sensitive data being accessed regardless of the storage place. Encryption can secure data in your network, computer, PDA, laptop or even in other removable media. If you are using emails, you can as well access your secure information from anywhere as long as internet is accessible. In the case where you lose your laptop, PDA or removable media, nobody can read the encrypted information. The best thing with cryptography is that its globally recognized and therefore it can fight any kind of data corruption. If you find someone who can do a good job in encryption, then you have no other worries of data being exposed. Many companies offer solutions that cover the entire organizations network security problem. When data is encrypted, your organization will have military level security.

Its no doubt that nobody would like a security system that comes with negative aspects. You should look out for a good data encryption system that doesnt affect the flow of your business but still encrypts the important data. The most appropriate systems usually run automatically and therefore you dont have to be involved practically. The benefits of encrypting information are endless as the protection offered is of high quality. In case of any data breach, chances of getting the information contained there are 0%. Using this kind of security increases your chances of having a peaceful mind and spend more time focusing on the production of your organization.

http://www.cryptographyandnetworksecurity.com/cryptography-on-your-network/

Das könnte Ihnen auch gefallen