Wednesday, 20 April 2011

crptography is recent technology

Cryptography is the practice and study of hiding information. In today’s environment, cryptography is

considered a branch of both mathematics and computer science, and is affiliated closely with information

theory, computer security, and engineering. Cryptography is used in technologically advanced applications,

including areas such as the security of ATM cards, computer passwords, and electronic commerce, which all

depend on cryptography.
Cryptology is the science of secret communication. It has two main subfields: cryptography is the science of creating secret codes; cryptanalysis is the science of breaking codes. There are five pillars of cryptology:

    * Confidentiality: keep communication private.
    * Integrity: detect unauthorized alteration to communication.
    * Authentication: confirm identity of sender.
    * Authorization: establish level of access for trusted parties.
    * Non-repudiation: prove that communication was received.

Cryptography has long been of interest to intelligence gathering and law enforcement agencies. There has

historically been a history of controversial legal issues surrounding cryptography. In some countries the use

of cryptography is restricted. Until 1999, France significantly restricted the use of cryptography

domestically. In China, a license is required to use cryptography. Many countries have tight restrictions on

the use of cryptography. In the United States, cryptography is legal for domestic use, but there has been

much conflict over legal issues related to cryptography, export controls and civil liberties.

Symmetric cryptography is susceptible to plain text attacks and linear cryptanalysis meaning that they are

hackable and at times simple to decode. With careful planning of the coding and functions of the

cryptographic process these threats can be greatly reduced. Asymmetric cryptography uses different encryption

keys for encryption and decryption. In this case an end user on a network, public or private, has a pair of

keys; one for encryption and one for decryption. These keys are labeled or known as a public and a private

key; in this instance the private key cannot be derived from the public key.

The asymmetrical cryptography method has been proven to be secure against computationally limited intruders.

The security is a mathematical definition based upon the application of said encryption. Essentially,

asymmetric encryption is as good as its applied use; this is defined by the method in which the data is

encrypted and for what use. The most common form of asymmetrical encryption is in the application of sending

messages where the sender encodes and the receiving party decodes the message by using a random key generated

by the public key of the sender.

No comments:

Post a Comment