Monday, June 10, 2019

Understanding Cryptography Essay Example | Topics and Well Written Essays - 1000 words

Understanding Cryptography - Essay ExampleCryptography is somehow omnipresent going beyond the conventional environments such as banking systems, government communications among others (Christoff, 2009). Cryptography is now apply in web browsers, cell phones, e-mail programs, embedded software, manufacturing systems, cars, medical plants, smart buildings among others (Christoff, 2009).Therefore, designers and system users neediness to understand comprehensively the concept of cryptography and how it is applied in order to appreciate its effectiveness in securing wireless networks and communication.According to Christoff (2009), cryptography is the study and trust of techniques for securing communication particularly in the presence of a trine party (adversary). Essentially, cryptography is mainly concerned with the development and determining protocols that protect against the influence of third parties in communication and networking. It also analyzes protocols and mechanisms t hat are related to information security aspects including data integrity, confidentiality, non-repudiation and authentication (Paar & Pelzl, 2010). Over the years, various techniques similar to encryption have been used as cryptography. However, modern cryptography borrows from disciplines of computer science, mathematics and electrical engineering among others. Cryptography is predominantly used in computer passwords, e-commerce, and ATM cards. It employs several tools and techniques to follow up the security needed for the various applications (Christoff, 2009).OpenSSL is one of the tools of cryptography that implements the SSL and the TSS security protocols in the network (Viega, Messier, & Chendra, 2002). It is mainly used in many web servers to diffuse packets in encrypted form rather than in plain readable text. Open SSL has a core library that is developed in C programming spoken language and is used for the implementation of the basic cryptographic functions and the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.