ISSC266_Week8_TermPaper
docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
266
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
14
Uploaded by adinajacobson405
Term Paper
1
Cryptography
Name
ISSC266 Cryptography Concepts
Professor: Margaret Foltz
26 October 2023
Term Paper
2
Cryptography is the practice of securing communication from adversaries. It involves the use of mathematical algorithms to convert plain text into an unreadable format, known as cipher text. The process of converting plain text to cipher text is known as encryption, while the process
of converting cipher text back to plain text is known as decryption. Cryptography is used in various applications, including secure communication, data storage, and authentication. It is an essential tool in ensuring the confidentiality, integrity, and availability of information. Cryptography has evolved over the years, and modern cryptography involves the use of complex algorithms and protocols to provide secure communication. It plays a crucial role in the lives of individuals, regardless of their awareness of it. Its application extends to various domains such as
commerce, technology, business, and criminology. However, the accessibility of cryptography to
the general public only emerged in the past century. Understanding the origins and initial forms of ciphers is essential to grasp the intricacies and characteristics of contemporary cryptography. Hence, this paper aims to explore and evaluate the historical progression of cryptography, highlighting its evolution and importance in modern society. The history of cryptography is a fascinating one, with its roots tracing back to ancient Egypt. It was during this time that secret hieroglyphs were used exclusively by the kings and their scribes to communicate. As time passed, various cultures such as the Assyrians, Greeks, and Romans began using simple monoalphabetic ciphers to transmit secret messages. Although these ciphers may seem basic to us today, they were considered complex and highly efficient during earlier times.
Despite being largely forgotten during the Dark Ages in Europe, various forms of monoalphabetic ciphers were still employed until the 15th century (Dooley, 2018). It was during this time that cryptography witnessed a significant advancement, driven by the flourishing of
Term Paper
3
culture, politics, and diplomacy. Kings, cardinals, and courtiers required ciphers that were challenging to decipher yet easy to utilize, leading to the development of polyalphabetic ciphers utilizing key phrases or words (Verma et al., 2017). These ciphers, with their intricate variations, continue to be utilized in modern times and have become an integral part of our daily lives. In spite of cryptography's long history, it wasn't until the early 20th century that it reached a new stage of development. The need for secure communication during the World Wars
led to the creation of machines capable of generating complex codes, which served as the precursors to modern computers. Today, computer programs allow for the encryption of information that is virtually unbreakable due to its complexity. As a result, the advent of modern technology and the widespread use of encryption for commercial purposes have propelled cryptography forward in just a few decades, surpassing the progress made in previous millennia.
The evolution of cryptography has been closely tied to its development, with the use of ciphers and codes being a government advantage for a significant period. The first ciphers were introduced around 4000 years ago, when communication was limited to wooden or stone tablets, leather ribbons, or parchment. These early forms of cryptography were used to convey messages to allies or rulers about troop movements or plans, with the aim of preventing the information from falling into enemy hands. Given the ease with which letters could be intercepted, the sender's primary objective was to make the message unreadable to the enemy.
Over time, cryptography has undergone significant changes, with new techniques and technologies being developed to enhance its effectiveness. Today, cryptography is used in a wide
range of applications, from securing online transactions to protecting sensitive data. The use of cryptography has become increasingly important in the digital age, where cyber threats are a constant concern. As such, the development of new cryptographic techniques and technologies is
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Term Paper
4
likely to continue, as organizations seek to stay ahead of the curve and protect their assets from potential threats..
During the Dark Ages in Europe, cryptography was practically not used due to the fall of general literacy. Only monks studied cryptanalysis to decipher the Bible’s messages and some religious writings, and, eventually, different available manuscripts. However, during the early Renaissance, cryptography again began to actively develop as, during this period, diplomacy and
political intrigue flourished between city-states and empires. Kings, courtiers, and aristocrats used encrypted messages to negotiate and build politics while avoiding the spread of information
to the public and enemies. In the early 19th century, the invention of cryptography was the telegraph, which transmitted information between cities using encrypted signals. However, in this case, the code was open, and the messages did not maintain confidentiality, so the cipher was aimed only at simplifying the transfer of information. This marked a significant shift in the purpose of cryptography, as it transitioned from a tool for secrecy to a means of efficient communication. The telegraph allowed for the rapid transmission of messages over long distances, but the lack of confidentiality meant that the content of the messages could be easily intercepted and understood by anyone who intercepted them.
Despite the limitations of early cryptographic methods, the development of cryptography during the Renaissance and the invention of the telegraph in the 19th century laid the foundation for the modern field of cryptography. Over time, advancements in technology and the increasing need for secure communication have led to the development of more sophisticated encryption algorithms and protocols. Today, cryptography plays a crucial role in ensuring the confidentiality
and integrity of sensitive information in various domains, including finance, national security,
Term Paper
5
and digital communications. Cryptography is a complex field that can be categorized into three main types: secret key cryptography, public key cryptography, and hash functions.
Secret key cryptography, also known as symmetric cryptography, involves the use of a single key to encrypt and decrypt data. This key is shared between the sender and the recipient, making it the simplest form of cryptography. The encryption process involves using a cryptographic algorithm and the secret key to transform the data into an unreadable format. When the data needs to be accessed again, the recipient uses the same key to decrypt the data and
make it readable. Secret key cryptography can be used for both in-transit and at-rest data, although it is more commonly used for data at rest due to the potential compromise of the secret key during transmission. Examples of secret key cryptography algorithms include AES, DES, and the Caesar Cipher.
Public key cryptography, also known as asymmetric cryptography, utilizes two different keys for encryption and decryption. One key, known as the private key, is kept secret and is used
for decryption. The other key, known as the public key, is shared publicly and can be used by anyone to encrypt messages. The mathematical relationship between the two keys ensures that the private key cannot be derived from the public key, providing an added layer of security. The private key should be kept confidential and only accessible to the owner, while the public key can be freely distributed. Public key cryptography is commonly used for secure communication and digital signatures. Examples of public key cryptography algorithms include ECC, Diffie-
Hellman, and DSS.
Hash functions are one-way functions that transform a given string of data into a fixed-
length string, known as a hash. These functions are irreversible, meaning that it is nearly impossible to recover the original message from the hash. Hashing is commonly used to protect
Term Paper
6
data integrity and verify the authenticity of data. A good hashing algorithm will produce unique outputs for each input, ensuring that even a small change in the input will result in a completely different hash. The only way to crack a hash is by trying every possible input until the same hash
is obtained. Hash functions are commonly used for password storage, data integrity checks, and in digital certificates. Some well-known hashing algorithms include MD5, SHA-1, and SHA-
256. Advancements in commercial cryptography have revolutionized the way financial transactions are protected. With the use of automated codes, individuals can now shop online with confidence, knowing that their bank account details are secure from potential fraudsters. This has greatly enhanced the convenience and accessibility of online shopping, as people no longer have to worry about the safety of their personal information. Additionally, cryptography serves a broader purpose beyond financial transactions, as it is also utilized to encrypt and transmit sensitive information, such as evidence for criminal investigations, in order to prevent leaks or corruption.
The evolution of cryptography can be traced through the increasing complexity of codes and ciphers used to encrypt messages. One of the earliest and simplest forms of encryption was the Caesar cipher, which was employed during the Gallic Wars. This cipher involved shifting the
letters of the alphabet forward by three positions. As cryptography advanced, a more intricate variant known as the monoalphabetic cipher emerged. In this cipher, each letter of the alphabet was replaced by another letter from the same alphabet, introducing a higher level of complexity and security.
Overall, the progress in commercial cryptography has significantly enhanced the security and privacy of financial transactions, enabling individuals to shop online without fear of their
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Term Paper
7
bank account details being compromised. Moreover, cryptography plays a crucial role in safeguarding sensitive information beyond financial transactions, such as evidence for criminal investigations. By understanding the historical development of cryptography, we can appreciate the increasing sophistication of codes and ciphers used to protect information, ensuring its confidentiality and integrity.
The modern era of cryptography has seen the development of new techniques such as public-key cryptography, which uses two keys - one public and one private - to encrypt and decrypt messages. This method was first proposed by Whitfield Diffie and Martin Hellman in 1976 and has since become widely used in secure communication protocols such as SSL/TLS and SSH (Stallings, 2017). Another important development has been the use of quantum cryptography, which uses the principles of quantum mechanics to create unbreakable codes. While still in its early stages, this technology has the potential to revolutionize the field of cryptography in the coming years.
In addition to these new techniques, there has also been a growing emphasis on the importance of key management and secure key exchange protocols. This is because even the strongest encryption algorithms can be compromised if the keys used to encrypt and decrypt messages are not kept secure. As a result, there has been a push towards the development of new key exchange protocols such as Diffie-Hellman key exchange and the use of hardware security modules (HSMs) to store and manage keys (Stallings, 2017). Overall, the field of cryptography continues to evolve and adapt to new threats and challenges, and it is likely that we will see many more innovations in the years to come.
The early stages of cryptography involved the recipient being aware of the letters that replaced the original letters. However, the development of cryptography led to the use of
Term Paper
8
polyalphabetic substitution ciphers, such as the Vigenere cipher, which utilized multiple Caesar ciphers to make the cipher unbreakable for centuries. Despite this, patterns were eventually identified, leading to the solution of the mystery.
With the advent of the Internet and computers, encryption algorithms have become more sophisticated, allowing for the encryption, transmission, and decryption of data across the globe in mere seconds. The most secure and unbeatable ciphers today are the Advanced Encryption Standard (AES) and asymmetric fonts, which utilize complex encoding systems. Asymmetric ciphers, for instance, require the sender and recipient to have a public and private key, with only the public key being necessary to send information. This eliminates the need for the exchange of information that could give access to the cipher, making it nearly impossible to break.
The main feature of this kind of cryptography was that the recipient had knowledge of the
letters that replaced the original letters. However, the development of cryptography progressed to
the use of polyalphabetic substitution ciphers, with the Vigenere cipher being one of the most well-known examples. This cipher utilized multiple Caesar ciphers, which made it extremely difficult to find the keyword and rendered the cipher unbreakable for a span of 300 years. Nevertheless, the mystery was eventually unraveled through the identification of patterns.
In cyberspace, our messages are not limited to text-only. Instead, a message can encompass any form of digital data. However, it is important to recognize that at its core, all digital data is essentially a sequence of bytes. Therefore, when it comes to securing this data, rather than encrypting or hashing sequences of characters, we focus on encrypting or hashing sequences of bytes. This approach allows us to apply various cryptographic techniques, such as the Ceasar shift, Vigenere Cipher, or Rubik's Cube Hash, to manipulate bytes ranging from 00000000 to 11111111, instead of restricting ourselves to letters from A to Z.
Term Paper
9
Nevertheless, it is worth noting that there exist significantly more advanced and robust symmetric encryption algorithms and hash algorithms that are readily available to us. These algorithms offer enhanced security and efficiency compared to the aforementioned techniques. As a result, it is prudent for us to explore and adopt these superior cryptographic methods. However, it is important to acknowledge that comprehending the inner workings of these advanced algorithms may prove to be challenging, and we may not be able to grasp them at the same level of depth as we do with simpler techniques. Nonetheless, by leveraging these more sophisticated cryptographic algorithms, we can significantly enhance the security and integrity of
our digital data in cyberspace.
Cryptography is an indispensable tool for ensuring information security. It provides four crucial services that are fundamental to maintaining the confidentiality, authentication, data integrity, and non-repudiation of data and communications. Encryption methods can protect data and communications against unauthorized access and disclosure, while cryptographic techniques like MAC and digital signatures can safeguard information against spoofing and forgeries. Cryptographic hash functions are also essential in giving users confidence in the accuracy of their data. Additionally, digital signatures offer the non-repudiation service to protect against disputes that can arise if the sender refuses to acknowledge receipt of the communication. With the help of these essential functions, businesses can now conduct their operations effectively and efficiently through networks using computer systems.
In addition to the four basic components of information security, there are other challenges that can hinder the efficient use of information. For instance, even authorized users may face difficulties accessing strongly encrypted, authenticated, and password-protected information when they need it for decision-making. Furthermore, network or computer systems
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Term Paper
10
may be vulnerable to attacks from intrusive parties, which can result in system failure or denial of service (DoS) attacks. While cryptography is an important tool for information security, it cannot guarantee high availability or selective access control. Administrative controls and processes are necessary to meet these requirements. Additionally, shoddy systems, methods, and procedures can create weaknesses that are not protected by cryptography, and a defensive infrastructure must be designed and constructed to address these issues. However, it is important to note that implementing cryptography comes with costs, including time and money. Encryption
mechanisms can also delay information processing, and building and maintaining a public key infrastructure requires substantial financial investment. Finally, the security of cryptographic techniques is based on the computational complexity of mathematical issues, which means that any improvement in mathematical solutions or processing capacity can make a cryptographic method insecure.
Organizations and individuals can effectively address cryptography-related threats by implementing a dedicated electronic key management system from a reputable provider. This solution involves the utilization of a hardware security module (HSM) to generate and safeguard cryptographic keys, which serves as the foundation for the overall security of the system. The HSM ensures that the keys are securely stored and protected from unauthorized access or tampering. One important feature of this solution is the full key management life cycle, which encompasses key generation, distribution, storage, and destruction. The system should have robust mechanisms for generating strong and random keys, ensuring that they are not easily guessable or susceptible to brute-force attacks. Additionally, strict policy-based controls should be in place to enforce access restrictions and prevent unauthorized key usage.
Term Paper
11
Another crucial aspect is swift compromise detection, which involves continuous monitoring and detection of any potential security breaches or compromises. This allows for immediate response and mitigation measures to be taken, minimizing the impact of any security incidents. Furthermore, secure key destruction is essential to ensure that keys are properly disposed of when they are no longer needed, preventing any potential misuse or unauthorized access.
To enhance the overall security of the system, strong user authentication mechanisms should be implemented. This ensures that only authorized individuals can access and manage the
cryptographic keys. Secure workflow management is also important, as it enables the efficient and controlled handling of key-related operations, such as key generation, distribution, and revocation. A secure audit and usage log should be maintained to track and monitor key usage activities. This log provides a comprehensive record of all key-related operations, allowing for effective auditing and compliance with data and privacy regulations. By implementing these features, organizations can protect their cryptographic keys, enhance operational efficiency, and ensure compliance with relevant security standards and regulations.
Another potential solution to address cryptography-related threats is the implementation of cryptography quantum. This approach leverages the principles of quantum mechanics to encode data in a quantum state, making it impossible to copy or intercept without detection. Quantum cryptography offers a high level of security, as any attempt to eavesdrop or tamper with the quantum-encoded data would disrupt the quantum state, alerting the sender and receiver to the presence of an intruder. By utilizing quantum cryptography, organizations can ensure the confidentiality and integrity of their sensitive data, even in the face of advanced cryptographic attacks. This solution provides a strong defense against threats posed by quantum computers,
Term Paper
12
which have the potential to break traditional cryptographic algorithms. However, it is important to note that the implementation of quantum cryptography requires specialized hardware and expertise, and may not be suitable
Over time, cryptography has undergone significant advancements, resulting in the creation of more intricate ciphers that are nearly impossible to crack. The advent of computers and the Internet has further revolutionized the encryption process, enabling the secure transmission of data across the globe. Comparing the simplicity of breaking a Caesar cipher, where one only needs knowledge of the alphabet, to modern encryption methods highlights the remarkable development of cryptography. Today, deciphering encrypted information without the
aid of computer programs is beyond the capabilities of the human brain. The history of cryptography analysis reveals its ancient origins, albeit with a slow and inconsistent development. Limited accessibility to the study of cryptography due to high illiteracy rates and lack of educational resources hindered its progress. However, the increasing demand for secure methods of transmitting information, coupled with technological advancements, served as catalysts for the growth of cryptography. In the past century, the field of information encryption has experienced a significant leap forward as the means of transforming text have undergone substantial changes.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Term Paper
13
References:
Advantages and disadvantages of cryptography
. (n.d.). www.javatpoint.com
. Retrieved
October
26, 2023, from
https://www.javatpoint.com/advantages-and-
disadvantages-of-cryptography
Cryptography and its types
. (2023, April 22). GeeksforGeeks. Retrieved
October
26, 2023, from
https://www.geeksforgeeks.org/cryptography-and-its-types/
Dooley, J.F. (2018).
History of cryptography and cryptanalysis: Codes, ciphers, and their algorithms.
Springer.
Fruhlinger,
J. (2022, May 22).
What is cryptography? How algorithms keep information secret and safe
. CSO Online. Retrieved
October
26, 2023, from
https://www.csoonline.com/article/569921/what-is-cryptography-how-algorithms-
keep-information-secret-and-safe.html
Nasution, S.D., Ginting, G.L., Syahrizal, M., & Rahim, R. (2017). Data security using Vigenere cipher and Goldbach codes algorithm.
International Journal of Engineering Research & Technology (IJERT)
,
6
(1), 360-363.
Qadir, A. M., & Varol, N. (2019). A review paper on cryptography.
2019 7th International Symposium on Digital Forensics and Security (ISDFS).
Web.
SI110: Digital cryptography
. (n.d.). Retrieved October 26, 2023, from
https://www.usna.edu/Users/cs/wcbrown/courses/si110AY13S/lec/l27/lec.html
What is cryptography in security? What are the different types of cryptography?
(2020, September 23). Encryption Consulting. Retrieved October 26, 2023, from
https://www.encryptionconsulting.com/education-center/what-is-cryptography/
Term Paper
14
What is cryptography?
(n.d.). Fortinet. Retrieved October 26, 2023, from
https://www.fortinet.com/resources/cyberglossary/what-is-cryptography
Verma, A., Kaur, S., & Chhabra, B. (2017). Design and development of robust algorithm for cryptography using improves AES technique.
International Journal of Computer Science and Information Security (IJCSIS), 15
(3), 66-82.
Related Documents
Recommended textbooks for you

Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Recommended textbooks for you
- Operations Research : Applications and AlgorithmsComputer ScienceISBN:9780534380588Author:Wayne L. WinstonPublisher:Brooks ColeSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning