How can I earn money with StudyBay? Top writers
Order Assignment
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates! Check price for your assignment
16 bids submitted. Essay Example.

Strategies of Enciphering or Encoding Message

In modern society, the success of any kind of activity is highly dependent on the possession of certain data (information) and its lack at competitors. The more pronounced this effect is, the greater the potential damage from abuse in the field of information and the greater the need to protect the information.

One of the most important problems of society is encoding and encryption of data.

The protection and concealment of information is studied by cryptology. Cryptology has two main directions – cryptography and cryptanalysis. The objectives of these directions are opposite. Cryptography is engaged in the construction and study of mathematical methods of information adjustment and cryptanalysis researches opportunities of information enciphering without a key. Cryptography is a system of conversion messages to make it unintelligible to the uninitiated people. It is a discipline that studies general properties and principles of cryptography systems.

By the nature of usage of encryption key, the algorithms of encryption can be divided into symmetrical and asymmetrical. The first method uses the same key in the encoder of the sender and in the decoder of the recipient. In the second case, the recipient first transmits a public key to the sender through the open channel, with which the sender encrypts information. Upon receiving the information the recipient decrypts it using the second private key.

All cryptosystems with a public key, which are currently used, are based on one of the following types of irreversible changes: decomposition of large numbers into prime factors (RSA algorithm), calculation of the logarithm and exponentiation (DH algorithm), and calculation of the roots of algebraic equations.

In the 1940s it has been suggested to develop the code so that its disclosure would be equivalent to solving a complex mathematical problem. The difficulty of the problem must be such that the amount of computation required would exceed the capabilities of modern computers.

In asymmetrical systems, long keys are used. This dramatically increases the time of encryption and the key generation can be pretty long, but you can send the keys through open communication channels.

In symmetric algorithms, shorter keys are uses, so the encryption and decryption happen faster. But the distribution of the keys becomes a complicated procedure.

In the US, for the transmission of secret messages, DES standard is most widely used. It provides triple data encryption with different keys.

In modern society, the success of any kind of activity is highly dependent on the possession of certain data (information) and its lack at competitors. The more pronounced this effect is, the greater the potential damage from abuse in the field of information and the greater the need to protect the information.

Related Materials
Assignment ID
100000732
Type
CREATED ON
July 23, 2016
COMPLETED ON
July 24, 2016
Price
$6
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates!
Check price for your Essay
Essay Example Comments
alyamit
December 10, 2016
alyamit
nice work, look forward to working with you again
amariex36650
December 9, 2016
amariex36650
:)
bre216146783
December 9, 2016
bre216146783
good writer! i would rate 6 stars!