Sie sind auf Seite 1von 5

Week 1 Assignment

Omor Faruk

University of the Cumberlands

Operations Security
ISOL 535
Professor: Dr Noel Broman

January 14, 2018


A Brief History of Cryptography

The word ‘Cryptography’ is derived from a Greek word ‘kryptos’, which means hidden.

Cryptography is originated from Egyptian practice of hieroglyphics dated back on 2000BC.

During that period these was consisted of composite pictograms and there were only few who

had idea about those. On around 100 BC to 44 BC it was used to communicate for internal

government messages but later it was not trusted by all and then it was substituted by a character

three position ahead of it in the Roman alphabet (Pawliw, 2014). Now in present world

cryptography is being used widely. In recent times, this process has turned into a battleground of

some of the world's best mathematicians and computer scientists. The ability to securely store

and transfer sensitive information has proved a critical factor in success in business. The process

in which the data is converted into secret code in order to make conduction over public network

is known as cryptography. The conduction process can be done by almost all communication

medium such as radio transmission, written text or in digital stream. So basically we can say that

cryptography keep us safe by converting data into unreadable format from an unauthorized user

(Cryptography, N.D.).

Process of Cryptography:

Cryptography is one of the ancient secret languages of communicating. In modern ages

this language is operates by a sender’s allowance of an encrypted message. It is done by a

symmetric approach that obscures the original meaning which has been recovered by the

receiver. This process uses a number of algorithms just to preserve the security of the messages.

These are outlined in specific structured which is known as ‘key’ and this is used in merging the

2
original message with the input to encrypting algorithm. The message with the key then act as

the input for the receiver while relating the decrypting algorithm (Bhatia & Sumbaly, 2014.).

Symmetric Vs Asymmetric Key Algorithm:

At past, cryptography algorithms were divided into Symmetric Key Algorithm and

Asymmetric Key Algorithm. Secure communication channel in network can be achieved through

the symmetric key algorithm. It is processed by using the same key for encryption and

decryption. This method is also well known as secret key cryptography. On other hand

asymmetric key distribution uses public key system. And this key again consists of private key

and public key. Private Key basically keeps the message secret and public key dispenses the

message over the network. The sender then encrypts the message using the public key of the

receiver. After that the receiver makes use of its private key to decrypt the message. So in this

whole process of distribution the private key is never in transit and hence less vulnerable to

security issues (Bhatia & Sumbaly, 2014.).

Primary Functions and Objectives:

Mainly cryptography composed with two major function; which are information privacy

and authentication. But other than this, it also focuses on the integrity, non-repudiation, and key

exchange of the system.

1. Privacy: It makes sure that no can will be able to read the message expect the

intended receiver.
2. Authentication: It checks the reliability of the message that is received by the user via

network.
3. Integrity: It also assures that the receivers’ message has not been altered in the way

from original.

3
4. Non-Repudiation: It checks that if the receiver is really getting a authentic message

from the sender or not.


5. Key Exchange: It is the process by which crypto keys are shared between receiver

and sender (Kessler, 2017).

Limitations and Conclusion:

At past cryptography offered security in terms of privacy of message but it was

provisional. But at present governments are not willing to make certain some of their units in and

out of the country. As a result there is no ways to receive and send hidden information that can

create a threat to their country. Cryptography has now been a subject to various restrictions in

several countries. And this restriction is ranged from limitation of usage and export of software

as well. Nonetheless, by the power of World Wide Web it is now easier to extend powerful

program and importantly spreading the primary techniques of cryptography (Pawliw, 2014). For

this we are now able to have most advanced cryptosystems and idea from the public domain.

References:
4
Bhatia, P., & Sumbaly, R. (2014, December). Framework for Wireless Network Security Using
Quantum Cryptography. Retrieved from
https://www.researchgate.net/publication/269338981_Framework_for_Wireless_Network
_Security_Using_Quantum_Cryptography on January 14, 2018.

Cryptography (N.D.). Retrieved from https://www.techopedia.com/definition/1770/cryptography


on January 14, 2018.

Kessler, G. C. (2017, December 1). An Overview of Cryptography . Retrieved from


https://www.garykessler.net/library/crypto.html on January 14, 2018.

Pawliw, B. (2014, August). Cryptography . Retrieved from


http://searchsoftwarequality.techtarget.com/definition/cryptography on January 14, 2018.

Das könnte Ihnen auch gefallen