Sunday, September 8, 2019

Cryptology Essay Example | Topics and Well Written Essays - 2000 words

Cryptology - Essay Example Furthermore, the user of interconnected computers and breakthrough is file and system sharing, make personal information and data even more vulnerable to these threats. At this point cryptology fits in perfectly to address the above issues accordingly. At the base of all internet communication and data security lays cryptology that serves as the foundation to security and data authenticity. Cryptology ensures data and information confidentiality by ensuring in the event that the data in intercepted, the eavesdropper will not understand the content. In addition, Data authenticity is ensured and the message recipient is assured the message is from the correct sender. Finally cryptology ascertains data integrity by providing specific proof that the data or information received is not subject to an alteration by third party. The figure below demonstrates a basic outline of cryptography process (Koblitz 2004). Background Cryptology can be defined as the study of cryptosystems, is simply p ut understanding how to uniquely hide a document or relevant information in plain sight. Normally this involves using a secret encoding that only the intended recipient understands. In a nut shell, cryptography is trying to understand how to pass private information in a public arena which in this case in the internet. This study is further subdivided into two distinct yet similar fields. Cryptography involves the design, creation and implementation of cryptosystems (Bauer 2006). These are the codes and complex formulas used to hide the information before or during data transfer. In addition, cryptosystems also includes measures and mechanisms of incorporating digital signatures in documents. Digital systems basically act as proof of ownership of digital content otherwise susceptible to alterations. On the other hand, cryptology also deals with cryptanalyses which studies the decoding of cryptosystems. Research data analysis and outline Two basic methods were considered for the purp oses of this research. Quantitative research, where collected data is expressed in mathematical figures then evaluated for appropriate results, and qualitative which does not involve figures but rather experiences of participants and the actual data obtained from various sources. In this instance, qualitative analysis best suited thit type of research and was extensively applied. The primary data sources included case studies and direct observation of crypto systems at work. In addition, secondary sources such as books, library articles and the internet provided a reliable reference point. Literature review According to Bauer (2006) cryptography is a field of study where systems and data security meets the power of mathematical functions and equations. Based on his research, cryptology and by extension cryptography offers to the world of security engineering tools that underlie and form the basic and modern security protocols. Buchmann (2004) adds on this analogy through his researc h that offers an insight to cryptography and the techniques involved in cryptanalysis. According to him cryptography is a key to distributed systems security and modern day data integrity. Buchman argues that powerful as it may be, cryptology has often been misconstrued by experts because of the various malpractice associated with it. Cryptography has often been used in the wrong arena to protect the wrong information, and pass illegal messages throughout time. Another

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.