Search icone
Search and publish your papers
Our Guarantee
We guarantee quality.
Find out more!

Encryption: Security in the age of technology

Or download with : a doc exchange

About the author

 
Level
General public
Study
others
School/University
California...

About the document

Sheila R.
Published date
Language
documents in English
Format
Word
Type
presentations
Pages
5 pages
Level
General public
Accessed
0 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Introduction.
    1. Encryption, a word associated with mystery and secrecy.
    2. The introduction of the Internet.
  2. How DES works.
    1. Different modes of usage.
    2. Problems with DES.
  3. IDEA - the International Data Encryption Algorithm.
    1. How it works.
  4. The SKIPJACK algorithm.
  5. How the Rijindael algorithm works.
  6. The future of Encryption.
    1. The use of quantum cryptography.
    2. Developement from the most simplistic ideas to highly complex algorithms.
  7. Conclusion.

Encryption is a word that is associated with mystery and secrecy. For hundreds of years, it is tool that has been used to help protect information. Simply, it is a process that scrambles ordinary textual or written information into something that is illegible and difficult to read or decipher. Private messages, military strategies, and financial data are some examples of things that have utilized encryption. Julius Caesar used a simple form of encryption by switching the letters in his messages so his enemies could not read it. Today it is known as a substitution cipher. Each letter of the alphabet is replaced with a letter three places further down the alphabet.

[...] LUCIFER was discarded as the standard because the technology of the time could not fit large sizes of bits on a single chip. Additionally, federal regulations limit the bit size of the cipher keys for use worldwide. How does DES work? Two sets of input are needed for any encryption. In this case, ordinary text, or plaintext, is sent in 64-bit blocks, and a key is created in blocks of 56- bits (the function expects a 64 bit key as input, extra bits could be used as parity bits) through a mathematical algorithm that is altered by permutation. [...]


[...] Technology influences the security of our most sensitive and private data. As we continue to learn at an astronomical rate, the steps we take to protect ourselves involve new, creative and sophisticated methods. The use of wireless technology with satellite and cellular phones raises new issues of security. Our encryption methods try to discourage the hackers and other intruders who want to compromise our information. We can only work towards staying one step ahead of them at all times. How secure will our information be in the future? [...]


[...] ?Decoding the Encryption Process- A little Security in an Online World?. Smart Computing Guide Series. V issue 8 (July '01) p.85 Stallings, William. Network and Internetwork Security p Stallings, William. Network and Internetwork Security p Weiers Ronald M. Introduction to Business Statistics, p127. Stallings, William. Network and Internetwork Security p. 43-44 Purser,Michael. Secure Data Networking, p Stallings, William. Network and Internetwork Security p. 58-64 Schultz, Keith ?Decoding the Encryption Process- A little security in an online world? Smart Computing Guide Series. [...]

Similar documents you may be interested in reading.

Security of information systems: Implementation of encryption

 Science & technology   |  Computer science   |  Thesis   |  01/25/2011   |   .pdf   |   4 pages

Recent documents in electronics category

The speculation around Sphero's BB-8

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   2 pages

Sphero's BB-8, the cross-generational companion

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   1 page