Monday, April 22, 2019

Cryptology Essay Example | Topics and Well Written Essays - 2000 words

Cryptology - Essay ExampleFurthermore, the user of interconnected computers and breakthrough is load and system sharing, make personal instruction and information even more vulnerable to these threats. At this top dog cryptology fits in perfectly to address the above issues accordingly. At the base of all internet discourse and data security lays cryptology that serves as the foundation to security and data authenticity. Cryptology ensures data and information confidentiality by ensuring in the event that the data in intercepted, the eavesdropper will not understand the content. In addition, information authenticity is ensured and the message recipient is assured the message is from the correct sender. Finally cryptology ascertains data law by providing specific proof that the data or information received is not subject to an adjustment by third party. The figure below demonstrates a basic outline of secret writing process (Koblitz 2004). footing Cryptology can be defined as the study of cryptosystems, is simply put understanding how to uniquely hide a document or relevant information in plain sight. Normally this involves utilise a secret encoding that only the intended recipient understands. In a nut shell, cryptography is trying to understand how to pass private information in a public arena which in this case in the internet. This study is further subdivided into two distinct yet similar depicted objects. Cryptography involves the design, universe of discourse and implementation of cryptosystems (Bauer 2006). These are the codes and complex formulas used to hide the information before or during data transfer. In addition, cryptosystems also includes measures and mechanisms of incorporating digital signatures in documents. Digital systems basically act as proof of ownership of digital content otherwise susceptible to alterations. On the other hand, cryptology also deals with cryptanalyses which studies the decoding of cryptosystems. Research d ata analysis and outline Two basic methods were considered for the purposes of this research. Quantitative research, where collected data is expressed in mathematical figures then evaluated for appropriate results, and qualitative which does not involve figures but rather experiences of participants and the actual data obtained from different sources. In this instance, qualitative analysis best suited thit type of research and was extensively applied. The primary data sources included case studies and direct observation of crypto systems at work. In addition, secondary sources such as books, library articles and the internet provided a reliable reference point. Literature review According to Bauer (2006) cryptography is a field of study where systems and data security meets the power of mathematical functions and equations. Based on his research, cryptology and by prolongation cryptography offers to the world of security engineering tools that underlie and form the basic and mod ern security protocols. Buchmann (2004) adds on this analogy through his research that offers an insight to cryptography and the techniques involved in cryptanalysis. According to him cryptography is a key to distributed systems security and modern day data integrity. Buchman argues that powerful as it may be, cryptology has lots been misconstrued by experts because of the various malpractice associated with it. Cryptography has often been used in the vilify arena to protect the wrong information, and pass illegal messages throughout time. Another

No comments:

Post a Comment