Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

Introduction to Cryptography

Beoordeling
-
Verkocht
-
Pagina's
7
Geüpload op
23-10-2023
Geschreven in
2022/2023

Unlock the secrets of cryptography with our comprehensive document, "Introduction to Cryptography". Designed for both beginners and those with a foundational understanding, this guide delves deep into the complex world of cryptography, illuminating its history, concepts, and practical applications.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

, Introduction to cryptography
What is it?
A method to turn regular information (plaintext) into a secret code (ciphertext) so only someone with the right key
can decode it. Example: sharing a coded secret with a friend

Relation to everyday life
Texting: Imagine you send a text to your friend about a surprise birthday party. If someone intercepts the
message, you wouldn't want them to know about the party. If the message is encrypted (coded), even if someone
sees it, they won't understand it.
Banking: When you use an ATM card, your bank uses cryptography to ensure that your transaction is secure. Your
pin number and transaction details are protected using these cryptographic techniques. So, even if a bad actor tries
to intercept this information, they won't be able to misuse it because it's encrypted.
Online Shopping: When you shop online and enter your credit card details, these details are encrypted by the
website. This ensures that even if someone tries to steal this information during its journey from your computer to
the website's server, they can't because it's all coded.
Passwords: When you set a password for an account, the system often doesn't store the exact password. Instead,
it stores an encrypted (coded) version of it. This way, even if someone breaks into the system, they can't just see
Chronology of Cryptography and steal your password easily.
Evolution Communication: Apps like WhatsApp use encryption so that only the sender and receiver can read the message.
Even if someone tries to intercept your chats, they can't read them without the decryption key.
1960s: (military)
Safeguard national secrets Digital Age:
& strategies Encryption and decryption • Need: Rise of computers & communication in
Goal: securely send a message ensuring only the 1960s increased demand for data
1970s: the intended recipient can understand it protection.
IBM kickstarts DES • Noteworthy: DES (especially important for
development Encryption: changing the original message using a code financial institutions' e-commerce).
Decryption: changing the coded message back to the original Public-Key Cryptography:
1976s: • Pioneers: Diffie & Hellman (1976)
Groundbreaking concepts by
introduced the concept.
Diffie & Hellman
P=D(E(P)) • RSA: 1978 - by Rivest, Shamir, Adleman.
• El Gamal: 1985 - based on the discrete
1978s:
P : Plaintext (original message) logarithm problem.
RSA unveiled by
E(P) : Encrypting P, resulting in ciphertext Digital Signatures:
Rivest,Shamir & Adleman
D(E(P)) : Decrypting the ciphertext to get back P • Value: Top contribution from public-key
1980s: cryptography.
Major advancement in • Standardization: 1991 - first international
Cryptography: A brief overview standard (RSA-based). 1994 - U.S.
cryptography
Initial Days: approved the Digital Signature Standard (El
1985: • Objective: Ensure message confidentiality. Gamal- based).
El Gamal's schemes based on • Tools: Mostly pen and paper. Ongoing Evolution:
the discrete logarithm • Historical Timeline: Begins ~4000 years ago with • Status: Constant advancement in systems,
problem the Egyptians. methods, and security.
World Affairs: • Modern Relevance: Emergence of new
1991s: • Impact: Influenced outcomes of both World Wars. standards, products, and infrastructure
ISO/IEC 9796 (Establishes • Users: Primarily militaries, diplomats, governments reflects the growing need for information
digital signature standards till the 1960s. security.
Cryptography starting as a military tools,
expended its horizon, adapting to technological
advances, indicating its sustained importance

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
23 oktober 2023
Aantal pagina's
7
Geschreven in
2022/2023
Type
College aantekeningen
Docent(en)
Delina
Bevat
Data hiding and encryption - chapter 1

Onderwerpen

$3.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
sitiannur

Maak kennis met de verkoper

Seller avatar
sitiannur University Kuala Lumpur
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
1
Laatst verkocht
-
Study with Me

Welcome to Study with Me – your one-stop destination for top-notch academic resources and notes! Do you ever find yourself overwhelmed by the vast amount of information you need to grasp? Are you constantly searching for simplified, concise, and effective study materials? Look no further! At Study with Me, we believe in quality over quantity. Our notes are curated, reviewed, and continuously updated to ensure they remain relevant, comprehensive, and student-friendly.

Lees meer Lees minder
0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen