Cryptography

Read Complete Research Material

CRYPTOGRAPHY

Cryptography

Name of the Writer

Name of the Institution

Abstract

This paper studies the Cryptography in detail and explores the concept of algorithms. Particularly, hash algorithm, and its advantages and disadvantages. Furthermore, explains the overall encryption security.

Cryptography

Introduction

The study and practice of system that facilities in securing communication in the existence of adversaries. In other words, cryptography is the analysis and constructions of protocols that help in overcoming the adversary's influence. This is also related to several aspects of information security; for instance, keeping the data confidential, authentication and data integration. The most common cryptography applications are computer passwords, ATM cards and electronic commerce.

Discussion

When someone is using his personal computer, some interruption such as while sending e-mail and colleagues can read emails. The data encoding process need a special key to read it known as encryption, such encryptions protect the data from adversaries. It helps protecting trade privacy and secrets.

The encryption program is detached or built into the application of email, it follows a same process. The data must passes from an algorithm that is a mathematical formula helps in converting the data into ciphertext that is encrypted data. These mathematical formula or algorithm requires a particular key that makes impossible for any person to break the encryption (Ferguson & Schnei, 2003).

There are three main modern cryptographic algorithms includes symmetric-key cryptography, public-key cryptography and hash functions. Symmetric-key cryptography is a method of encryption, in which receiver and sender mutually use the same keys; or in some cases, keys are different, but are associated in an effortlessly computable way. Public-key cryptography is a system refers to a calculation of a private key that is feasibly not possible from the public key; however they are shared. These keys are interrelated and generated secretly. Whereas, hash functions employ a mathematical transformation to irrevocably information encryption. Additionally, cryptanalysis identifies insecurity and flaws in a scheme permits evasion (Levy, 2001).

The cryptographic hash algorithm is defined as a resolving procedure, which receives a random data block and get back with a fixed size bit series, the value of cryptographic, for example accidental data change will have an effect on hash value. The encoding of data is in the form of a message, and the value of the hash is referred as simply digest or message digests. The significant properties of hash algorithm include easy computation of message's hash value; impossible to engender message that possess a known hash; impossible to ...
Related Ads