Search icone
Search and publish your papers

Encryption: Security in the age of technology

Or download with : a doc exchange

About the author

General public

About the document

Published date
documents in English
5 pages
General public
0 times
Validated by
0 Comment
Rate this document
  1. Introduction.
    1. Encryption, a word associated with mystery and secrecy.
    2. The introduction of the Internet.
  2. How DES works.
    1. Different modes of usage.
    2. Problems with DES.
  3. IDEA - the International Data Encryption Algorithm.
    1. How it works.
  4. The SKIPJACK algorithm.
  5. How the Rijindael algorithm works.
  6. The future of Encryption.
    1. The use of quantum cryptography.
    2. Developement from the most simplistic ideas to highly complex algorithms.
  7. Conclusion.

Encryption is a word that is associated with mystery and secrecy. For hundreds of years, it is tool that has been used to help protect information. Simply, it is a process that scrambles ordinary textual or written information into something that is illegible and difficult to read or decipher. Private messages, military strategies, and financial data are some examples of things that have utilized encryption. Julius Caesar used a simple form of encryption by switching the letters in his messages so his enemies could not read it. Today it is known as a substitution cipher. Each letter of the alphabet is replaced with a letter three places further down the alphabet.

[...] LUCIFER was discarded as the standard because the technology of the time could not fit large sizes of bits on a single chip. Additionally, federal regulations limit the bit size of the cipher keys for use worldwide. How does DES work? Two sets of input are needed for any encryption. In this case, ordinary text, or plaintext, is sent in 64-bit blocks, and a key is created in blocks of 56- bits (the function expects a 64 bit key as input, extra bits could be used as parity bits) through a mathematical algorithm that is altered by permutation. [...]

[...] Technology influences the security of our most sensitive and private data. As we continue to learn at an astronomical rate, the steps we take to protect ourselves involve new, creative and sophisticated methods. The use of wireless technology with satellite and cellular phones raises new issues of security. Our encryption methods try to discourage the hackers and other intruders who want to compromise our information. We can only work towards staying one step ahead of them at all times. How secure will our information be in the future? [...]

[...] ?Decoding the Encryption Process- A little Security in an Online World?. Smart Computing Guide Series. V issue 8 (July '01) p.85 Stallings, William. Network and Internetwork Security p Stallings, William. Network and Internetwork Security p Weiers Ronald M. Introduction to Business Statistics, p127. Stallings, William. Network and Internetwork Security p. 43-44 Purser,Michael. Secure Data Networking, p Stallings, William. Network and Internetwork Security p. 58-64 Schultz, Keith ?Decoding the Encryption Process- A little security in an online world? Smart Computing Guide Series. [...]

Similar documents you may be interested in reading.

Security versus privacy information technologies: is Big Brother watching us?

 Business & market   |  Management   |  Thesis   |  09/29/2010   |   .pdf   |   69 pages

Security of information systems: Implementation of encryption

 Science & technology   |  Computer science   |  Thesis   |  01/25/2011   |   .pdf   |   4 pages

Recent documents in electronics category

The speculation around Sphero's BB-8

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   2 pages

Sphero's BB-8, the cross-generational companion

 Science & technology   |  Electronics   |  Presentation   |  11/10/2015   |   .pdf   |   1 page