Studybay uses cookies to ensure that we give you the best experience on our website. By continuing to use Studybay you accept our use of cookies view more on our Cookie Policy
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates! Check price for your assignment
16 bids submitted. Essay Example.

# Strategies of Enciphering or Encoding Message

In modern society, the success of any kind of activity is highly dependent on the possession of certain data (information) and its lack at competitors. The more pronounced this effect is, the greater the potential damage from abuse in the field of information and the greater the need to protect the information.

One of the most important problems of society is encoding and encryption of data.

The protection and concealment of information is studied by cryptology. Cryptology has two main directions – cryptography and cryptanalysis. The objectives of these directions are opposite. Cryptography is engaged in the construction and study of mathematical methods of information adjustment and cryptanalysis researches opportunities of information enciphering without a key. Cryptography is a system of conversion messages to make it unintelligible to the uninitiated people. It is a discipline that studies general properties and principles of cryptography systems.

By the nature of usage of encryption key, the algorithms of encryption can be divided into symmetrical and asymmetrical. The first method uses the same key in the encoder of the sender and in the decoder of the recipient. In the second case, the recipient first transmits a public key to the sender through the open channel, with which the sender encrypts information. Upon receiving the information the recipient decrypts it using the second private key.

All cryptosystems with a public key, which are currently used, are based on one of the following types of irreversible changes: decomposition of large numbers into prime factors (RSA algorithm), calculation of the logarithm and exponentiation (DH algorithm), and calculation of the roots of algebraic equations.

In the 1940s it has been suggested to develop the code so that its disclosure would be equivalent to solving a complex mathematical problem. The difficulty of the problem must be such that the amount of computation required would exceed the capabilities of modern computers.

In asymmetrical systems, long keys are used. This dramatically increases the time of encryption and the key generation can be pretty long, but you can send the keys through open communication channels.

In symmetric algorithms, shorter keys are uses, so the encryption and decryption happen faster. But the distribution of the keys becomes a complicated procedure.

In the US, for the transmission of secret messages, DES standard is most widely used. It provides triple data encryption with different keys.

In modern society, the success of any kind of activity is highly dependent on the possession of certain data (information) and its lack at competitors. The more pronounced this effect is, the greater the potential damage from abuse in the field of information and the greater the need to protect the information.

Assignment ID
100000732
Discipline
Type
CREATED ON
30 July 2016
COMPLETED ON
1 August 2016
Price
\$6
This order has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 professional writers. Hire your writer directly, without overpaying for agencies and affiliates!
Don delillo’s white noise
Essay, Information Technology
Price 30 \$
The burdening affects of alzheimer's
Essay, Information Technology
Price 30 \$
The inevitability of the civil war
Essay, Information Technology
Price 30 \$
The use of violet and blue hues
Essay, Information Technology
Price 30 \$
Slavery in africa
Essay, Information Technology
Price 30 \$
Discussing savages at hand
Essay, Information Technology
Price 30 \$
Bush's zero tolerance on iraq
Essay, Information Technology
Price 30 \$
Online games get real, just look closer
Essay, Information Technology
Price 30 \$
Accounting scandals of cendant corporation
Essay, Information Technology
Price 30 \$
The criminal history of masturbation
Essay, Information Technology
Price 30 \$
Advertising and rhetorical modes of persuasion
Essay, Information Technology
Price 30 \$
The responsibility of a character in a novel
Essay, Information Technology
Price 30 \$
Studybay assignment progress timeline
Studybay is a freelance platform where you can order a Strategies of Enciphering or Encoding Message paper, written from scratch by professors and tutors.
30 July 2016
User posted an order for Information Technology
30 July 2016
18 writers responded
30 July 2016
User contacted writer Hopkins1
30 July 2016
User hired writer Hopkins1 who offered a price of \$6 for the job and has experience doing similar assignments
1 August 2016
Writer completed order Strategies of Enciphering or Encoding Message for 1 day, meeting the deadline
1 August 2016
User accepted the job right away and completed the payment
1 August 2016
User left a positive review
Leadership Strategies in Bear in mind the Titans
Leadership AOTEAROA TERTIARY INSTITUTE NZIM DIPLOMA IN MANAGAMENT LEVEL 5 LEADERSHIP 630 ASSESSED Guide : FILM STUDY REMEMBER THE TITANS Name: Prithi...
The Development of Organic Societies
History Keywords: historic mesopotamia history, traditional china history, historic indus society, early egypt society Introduction The development of...
Overview of 12 Old Testament
Theology ASSIGNMENT 1 INTRODUCTION If we have a look at the Bible, it is interesting to note that 40% of the materials in the bible includes narratives,...
Psoriasis Case Study
Nursing Case Study B. Trimble Case Study P.D. a twenty-three-year-old woman presents with symptoms of psoriasis. She's several thick scaly, well...
Other assignments in this discipline
Thesis, Information Technology
Price 140 \$.
Hands-on activity: balanced scorecard & kpis
Coursework, Information Technology
Price 40 \$.
Essay, Information Technology
Price 30 \$.
Written assignment
Coursework, Information Technology
Price 40 \$.
Information strategy & infromation technology 2
Reports, Information Technology
Price 30 \$.
Information system & information technology strategy
Reports, Information Technology
Price 30 \$.
Assignment 4: the future of digital crimes and digital terrorism
Reports, Information Technology
Price 30 \$.
Contingency planning in action
Term paper, Information Technology
Price 30 \$.
security regulation compliance
Term paper, Information Technology
Price 30 \$.
Disaster recovery (dr) team
Essay, Information Technology
Price 30 \$.
Assignment 4: virtualization and the cloud computing world
Research Paper, Information Technology
Price 40 \$.