Thursday, May 30, 2019
Cryptography :: essays research papers
Cryptography is one way you can keep information secure. A person who does not know the method physical exertiond to change the information to keep it secure cannot copy the method utilise or reverse the change. The staple components of cryptological systems are used to encipher (scramble) information so that it is difficult to determine the meaning without the appropriate paint or key(s) to decipher (unscramble) the information. The components include cryptographic algorithms (mathematical functions) for enciphering or deciphering information and keys. Symmetric and asymmetric are two examples of cryptographic systems. Symmetric systems use the same key to encipher and decipher. Asymmetric systems generate and use different keys to encipher and decipher a secure key pair. With this key pair, consisting of a habitual key and a private key, only one key can decipher what the other enciphers.Merely knowing one key does not make it very likely that someone will be competent to fi gure out the other key. Asymmetric key pairs are used in creating digital signatures and transporting symmetric keys. In the past, most encryption systems only used symmetric cryptography. The problem with symmetric cryptography though, is the difficulty encountered in distributing keys to certain people. Since symmetric cryptography uses the same key for enciphering and deciphering, a person has to use fictive and difficult means to prevent someone from intercepting the key. If a third party were to intercept the key, they could use it to decipher anything it was used to encipher. A solution to this problem is public key cryptography which uses asymmetric cryptography to transport symmetric keys.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.