Thursday, March 14, 2019
Data Encryption Essay -- Encrypting Text Essays
data Encryption I. What is Data Encryption? Data encryption describes the transformation of plain text into a different format that is meaningless read by human bosom without being decrypted, so called cipher text, in order to prevent either unauthorized party to obtain information from the document. According to the Webster dictionary, cryptography is the work out and study of data encryption and decryption - encoding data so that it can only be decoded by specific individuals. Crypto is derived from the Greek discussion kruptos, to hide, from kruptein, which means hidden and secret. In the old days, people attempted to retain certain information as their private possession, and to hide the information from exposures to the public. on that point were many different methods they used in order to conceal this information, much(prenominal) as substituting part of the information by symbols, numbers or p ictures for different reasons to protect their secrets. With the advancement of human intellects and modern computing powers, cryptosystems are invented as systems used to encrypt and decrypt data electronically. By deploying sophisticate mathematical algorithm into the process, it combines the original data with one or much a serial of numbers or strings of characters, as cognize as keys privately and solely owned by sender and/or recipient. Cipher text is generated as an end result of this process. The computer aid data encryption is much more accurate, efficient and reliable compared to the old-fashioned methods. Encryption has a very long history,1 which can be traced plunk for to about 1900 B.C. Cryptography was first used in the form of hieroglyphical inscription by an ... ...partment of Commerce, National Institute of Standards and Technology, , Docket Number 000929280-1201-022. national Information, Processing Standards Publication 197, Announcing the Advanced Encryption Standards, (November 26, 2001)3. Jim Reavis, Network World Fusion, , (July 30, 2001)4. Joan Daemen,Vicent, Rijmen, The RijnDael thrust Cipher, AES Proposal, (2000)5. Lou Breit, certification Demands Lead to Strong Measures, Enterprise Networking Magazine, (December, 2002)6. SANS Institute, History of Encrytion, Information Security Reading Room, 20017. Think Quest Team, Data Encryption, History, Legal and Ethics, (Copyright1999)8. Andrew S. Tanenbaum, Computer Networks, prentice Hall PTR, page 479-512, Third Edition, (1996)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment