Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary overview of encryption

Beoordeling
-
Verkocht
-
Pagina's
13
Geüpload op
16-10-2025
Geschreven in
2024/2025

Summary of 13 pages for the course overview of cyber security at Annamalai University (best of luck)

Instelling
Vak

Voorbeeld van de inhoud

OVERVIEW OF CRYPTOGRAPHY AND TODAY’S ENCRYPTION
M.SAFANA YASMIN MSC(COMPUTER SCIENCE)
Abstract 2,500 years. Cryptography was used
This paper presents a detailed study of in the form of ‘substitution ciphers’ in
asymmetric and symmetric encryption the reign of Julius Caesar. In that
and decryption algorithms by encryption, each letter was replaced
focusing on the operations, the by three other letters.
strengths, and weaknesses of the RSA In the nineteenth century, it started
and Data Encryption Standard (DES) with a traditional aim of securing
algorithms. The best characteristics of governments and the military. At that
DES and RSA algorithms can be time, i.e., prior to the 1970s,
combined to form a hybrid encryption cryptography was only practiced by
algorithm to provide the desired the government and military
properties of message integrity, personnel; however, later, it spread in
authentication, and non-repudiation. the public sector. Piper & Murphy
This improves the security of (2002) has also mentioned
information as anyone having the cryptography of the 1970s as a ‘black
public key can only encrypt the art’ only accessible by the
message but not decrypt it government.
In a traditional context, its popularity
Cryptography and increase in public awareness lead
According to Curtin (2007), the museums and places of historic
cryptography is the study of the interest to discover their origin.
mathematical methods used to Therefore the museums started
develop algorithms which are used for exhibiting the old cipher machines.
secret writing to enforce message Later, when media started exposing
authentication, integrity, and cryptography as a means for
confidentiality. providing security, many films on the
Cryptography enables the detection Second World War stressed the
and prevention of cheating and importance of code-breaking.
malicious activities (Akl & Taylor, However, films like Pearl Harbor
1993). explained the impact of the breaking
of encrypted messages.
History With the passage of time,
Cryptography or encrypting the cryptography was made available to
message is just like a letter, which at all sectors of society. Two forces that
the time of posting is sealed in the influenced this transition of awareness
envelope. Piper & Murphy (2002) were ‘business’ and ‘Internet,’ and
Cryptography is a well-established both, when combined, gave rise to
science that has been a significant ‘online’ companies. With the advent
historical influence for more than of online business, the concept of ‘e-

1

, OVERVIEW OF CRYPTOGRAPHY AND TODAY’S ENCRYPTION
M.SAFANA YASMIN MSC(COMPUTER SCIENCE)
commerce’ gradually appeared, Figure 1
thereby creating awareness on the
customer level. Governments who
once adopted ‘cryptography’ while
communicating with their militants
now started communicating with their
citizens via the Internet. These were,
on the one hand, provided
opportunities; on the other created The figure above illustrates the public
concerns which involved security at and private cryptosystem which is
every level like ‘taxation,’ ‘illegal used to achieve message encryption,
transaction,’ etc. So, in order to deal decryption, integrity, authentication,
with such issues, there emerged a non-repudiation, and confidentiality
need to advance cryptography. (Curtin, 2007).
Symmetric
Bellovin and Merritt (1992) argues
that a symmetric algorithm uses one
secret key to encrypt plaintext into
ciphertext and to decrypt ciphertext
into plaintext.
The advantage with the symmetric
algorithm is that it consumes fewer
resources than its asymmetric
counterpart. The main challenge with
symmetric algorithms is to keep the
key secret. However, if the key is
known to the attacker, the
communication becomes unsafe
(Curtin, 2007).

Encryption
Encryption is a process that uses an
encryption algorithm to convert a
message from plaintext into
ciphertext, making the message
unreadable to a third party (Akl & Asymmetric
Taylor, 1993). Figure 1 below shows An asymmetric encryption algorithm
a cryptographic system used to uses a public key to encrypt a
encrypt and decrypt messages. message and a private key to decrypt
the message (Curtin, 2007). The
2

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
16 oktober 2025
Aantal pagina's
13
Geschreven in
2024/2025
Type
SAMENVATTING

Onderwerpen

€7,52
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
safacute890

Maak kennis met de verkoper

Seller avatar
safacute890 studypool
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
6 maanden
Aantal volgers
0
Documenten
2
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen