Beruflich Dokumente
Kultur Dokumente
Omor Faruk
Operations Security
ISOL 535
Professor: Dr Noel Broman
The word ‘Cryptography’ is derived from a Greek word ‘kryptos’, which means hidden.
During that period these was consisted of composite pictograms and there were only few who
had idea about those. On around 100 BC to 44 BC it was used to communicate for internal
government messages but later it was not trusted by all and then it was substituted by a character
three position ahead of it in the Roman alphabet (Pawliw, 2014). Now in present world
cryptography is being used widely. In recent times, this process has turned into a battleground of
some of the world's best mathematicians and computer scientists. The ability to securely store
and transfer sensitive information has proved a critical factor in success in business. The process
in which the data is converted into secret code in order to make conduction over public network
is known as cryptography. The conduction process can be done by almost all communication
medium such as radio transmission, written text or in digital stream. So basically we can say that
cryptography keep us safe by converting data into unreadable format from an unauthorized user
(Cryptography, N.D.).
Process of Cryptography:
symmetric approach that obscures the original meaning which has been recovered by the
receiver. This process uses a number of algorithms just to preserve the security of the messages.
These are outlined in specific structured which is known as ‘key’ and this is used in merging the
2
original message with the input to encrypting algorithm. The message with the key then act as
the input for the receiver while relating the decrypting algorithm (Bhatia & Sumbaly, 2014.).
At past, cryptography algorithms were divided into Symmetric Key Algorithm and
Asymmetric Key Algorithm. Secure communication channel in network can be achieved through
the symmetric key algorithm. It is processed by using the same key for encryption and
decryption. This method is also well known as secret key cryptography. On other hand
asymmetric key distribution uses public key system. And this key again consists of private key
and public key. Private Key basically keeps the message secret and public key dispenses the
message over the network. The sender then encrypts the message using the public key of the
receiver. After that the receiver makes use of its private key to decrypt the message. So in this
whole process of distribution the private key is never in transit and hence less vulnerable to
Mainly cryptography composed with two major function; which are information privacy
and authentication. But other than this, it also focuses on the integrity, non-repudiation, and key
1. Privacy: It makes sure that no can will be able to read the message expect the
intended receiver.
2. Authentication: It checks the reliability of the message that is received by the user via
network.
3. Integrity: It also assures that the receivers’ message has not been altered in the way
from original.
3
4. Non-Repudiation: It checks that if the receiver is really getting a authentic message
provisional. But at present governments are not willing to make certain some of their units in and
out of the country. As a result there is no ways to receive and send hidden information that can
create a threat to their country. Cryptography has now been a subject to various restrictions in
several countries. And this restriction is ranged from limitation of usage and export of software
as well. Nonetheless, by the power of World Wide Web it is now easier to extend powerful
program and importantly spreading the primary techniques of cryptography (Pawliw, 2014). For
this we are now able to have most advanced cryptosystems and idea from the public domain.
References:
4
Bhatia, P., & Sumbaly, R. (2014, December). Framework for Wireless Network Security Using
Quantum Cryptography. Retrieved from
https://www.researchgate.net/publication/269338981_Framework_for_Wireless_Network
_Security_Using_Quantum_Cryptography on January 14, 2018.