Verified Document

Cryptography History Of Cryptography The Term Paper

Banks is another common user of cryptography and whose input and output information are critical and must remain confidential. These days, a large percentage of banking transactions can be done online. Hence it is very critical that the information of bank customers is highly secured. If one is to access a banking online site, it is noticeable that a warning is provided to the user informing him that the site he is about to access is secured. Moreover, such secured sites are marked by a lock icon shown at the bottom part of the user's browser. Within a user's session in a secured site, it is typical that cryptography works at the background of every information exchange that occurs between the user and the site's system. This happens to ensure that all information sent and received by the user is authenticated and secured.

There are more areas particularly in the World Wide Web where cryptography is being used. All of which aims to ensure that data transmitted between the sender and receiver remain secured and authentic.

Security Considerations

Within the history of cryptography, the methods at which data is encrypted have transformed from the simplest form into complex ones. Such development occurs in an aim to ensure that stronger security is enforced on information exchange. It cannot be considered though that cryptography, via encryption and decryption of data, is a 100% guaranteed data security measure. This is because several reports show that cryptography still has a small amount of vulnerability. it, however, reduces at a high percentage the possibility that information can be attacked by malicious activities. One proof to the vulnerability of cryptographic encryption method and something to consider when implementing cryptography was recently reported by the Computer Security Resource Center. The report states the following.

An attack has been found on some implementations of RSA digital signatures using the padding scheme of PCKS-1 when the public key e = 3. A similar attack could also be applied to implementations of digital signatures as specified in American National Standard (ANS) X9.31. Note that this attack is not on the RSA algorithm itself, but on improper implementations of the signature verification process."

Although the report indicates that the attack can be caused by improper implementation, the conclusion in the end...

A paper from cryptography analysts called the encryption algorithm "kindergarten cryptography." Actually, software exists that exploits a huge security hole in the encryption standard. This software listens to the encrypted network traffic, analyzes it, and after only a few hours it reveals the password to enter the network in clear text. The more traffic on the network, the easier it is to find out the password because some packets are particularly weak because they carry a bad so-called initialisation vector (IV). Recent access points try to avoid these bad IVs, so it is getting harder to exploit the hole."
Other important considerations when implementing cryptography are the following.

Securing physical access to an area

Confidentiality of encryption methods used

Making backup

Continuous research and study that can ensure the strength of cryptography method being used.

Bibliography

Hebert, S. (2001). A Brief History of Cryptography.

Retrieved on October 14, 2006, from Online.

Web site: http://www.cybercrimes.net/Cryptography/Articles/Hebert.html

Cryptography.

Retrieved on October 14, 2006, from Wikipedia Online.

Web site: http://en.wikipedia.org/wiki/Cryptography

Public-key Encryption.

Retrieved on October 14, 2006, from Webopedia Online.

Web site: http://www.webopedia.com/TERM/P/public_key_cryptography.html

Symmetric-key Encryption.

Retrieved on October 14, 2006, from Webopedia Online.

Web site: http://www.webopedia.com/TERM/S/symmetric_key_cryptography.html

An Attack on RSA Digital Signature.

Retrieved on October 14, 2006, from National Institute of Standards and Technology Online. Web site: http://csrc.nist.gov/news-highlights/RSA-statement_10-12-06.pdf

Security Considerations on WEP Cryptography.

Retrieved on October 14, 2006, from Online. Web site: http://docs.kde.org/stable/en/kdenetwork/kwifimanager/wep.html

Sources used in this document:
Bibliography

Hebert, S. (2001). A Brief History of Cryptography.

Retrieved on October 14, 2006, from Online.

Web site: http://www.cybercrimes.net/Cryptography/Articles/Hebert.html

Cryptography.
Web site: http://en.wikipedia.org/wiki/Cryptography
Web site: http://www.webopedia.com/TERM/P/public_key_cryptography.html
Web site: http://www.webopedia.com/TERM/S/symmetric_key_cryptography.html
Retrieved on October 14, 2006, from National Institute of Standards and Technology Online. Web site: http://csrc.nist.gov/news-highlights/RSA-statement_10-12-06.pdf
Retrieved on October 14, 2006, from Online. Web site: http://docs.kde.org/stable/en/kdenetwork/kwifimanager/wep.html
Cite this Document:
Copy Bibliography Citation

Related Documents

History of Communication
Words: 6119 Length: 14 Document Type: Term Paper

History Of Communication Timeline TIMELINE: HISTORY OF COMMUNICATION (with special reference to the development of the motorcycle) 35,000 BCE. First paleolithing "petroglyphs" and written symbols. This is important in the history of communication because it marks the first time humans left a recorded form of communication. Also, these written symbols became the ultimate source of later alphabets. Wikipedia, "Petroglyph." 12,600 BCE. Cave paintings at Lascaux show early representational art. This is important in the history of communication

Renowned Cryptographers and Cryptanalysts Cryptography
Words: 1187 Length: 4 Document Type: Term Paper

Agnes Meyer Driscoll Like Yardley, Agnes Meyer Driscoll was born in 1889, and her most significant contribution was also made during World War I. Driscoll worked as a cryptanalyst for the Navy, and as such broke many Japanese naval coding systems. In addition, Driscoll developed many of the early machine systems. Apart from being significantly intelligent for any person of her time and age, Driscoll was also unusual in terms of

Communication History
Words: 4777 Length: 15 Document Type: Term Paper

Communication History Fans of science fiction are fond of recalling a remark by novelist Arthur C. Clarke, to the effect that any sufficiently advanced technology is indistinguishable from magic. I am currently typing these sentences onto a laptop, where I am also currently watching a grainy YouTube video of the legendary magician Harry Houdini, performing one of his legendary escapes -- from a straitjacket, in this case. Houdini is probably the

20th Century Intelligence Operations
Words: 877 Length: 3 Document Type: Book Review

Signals intelligence (SIGINT) is an integral part of military strategy. Referring to the interception and decoding of enemy communications, SIGINT is the topic of Peter Matthew's 2013 publication, SIGINT: The Secret History of Signals Intelligence 1914-1945. Matthew focuses on the history of SIGINT until the Cold War. What makes SIGINT: The Secret History of Signals Intelligence unique is that the author presents the Axis point-of-view on SIGINT. As Matthew (2013)

Espionage Study Guide
Words: 9330 Length: 34 Document Type: Essay

Espionage Burds, Chapter 19 Golden Age of Soviet "Illegals" Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross These five were all discovered to be spying for the Soviets. Cairncross was never caught. He supplied Stalin with secrets that helped the Soviets stay ahead of British Intelligence, especially at the Battle of Kursk Cairncross also informed Stalin of ULTRA, when Churchill was hiding ULTRA from Stalin Cairncross supplied a total of 5832 documents to the Soviets Cairncros had been

European Law Intellectual Property
Words: 3674 Length: 12 Document Type: Term Paper

Intellectual Property Law There has been much controversy surrounding the European Union copyright directive, especially as this relates to the music industry. There have been several arguments that these laws are inadequate when taking into account new technological developments, especially with regard to the Internet. Indeed, when the media industry in general is taken into account, the rapid developments require adjustments in legislation. While the copyright directive is an attempt at

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now