Lesson - Research field of computer science Presentation name - CRYPTOGRAPHY presentatives names- Joseph Uhemba&
Izadin Abdalah
Representative name- Venance Luhemeja
Lecture name - Prof: Matti Tedre
INTRODUCTION TO CRYPTOGRAPHY
Cryptography is the scientific studies of hiding information in term of encrypting and decrypt of either data or information from the conveyer to the aimed/ intended destination person or point.
HISTORICAL BACKGROUND OF CRYPTOGRAPHY
In early years ago although the technology was less improved the system of cryptography used by Egyptians as tools to protect national secrets and strategies on attachments of their enemies, through which all processes of computer networks, messages were digitally encrypted and decrypted. Different methods were used so as to make communication with their neighbors without exposing their information to be known by their enemies.
(i). Caesar’s Alphabet This was a simple method used by those people in term of substitute cipher – a letter shift behind or forward but in good manners so as to be translated by the destination of that data. I.e. ABCDEFGHIJKLMNOPQRSTUVWXYZ Example instead of writing the name VENANCE We used cipher letter to write YHQDQFH.
(ii) Enigma Also this is the electronically cryptographic machine used to send the hidden information by Egyptians.
AIM OF CRYPTOGRAPHY
(a) SECURITY
It was created purposely with the aim of protecting data or information securely in order to reach a receiver of that information.
(b) COMMUNICATION
Also apart from hiding information, it was necessary for sender and receiver of that information to achieve goals of communications.
(c) EDUCATION
Lastly but not the least, cryptography help we as IT professionals to learn more about tools of the computer system.
COMPONENTS OF CRYPTOGRAPHY
According to our previous lesson we only discussed on cryptography components has two basics components as arranged below; 1-An algorithm (Cryptographic method) 2-Keys Apart from the components of cryptography we discussed more the types of these ways on how to send and receive information, in which are classified as
a.Secret key system In Secret key system some times are known as symmetric systems wherein we use a single key for both encryption and decryption of data.
b. Public key system. Also in Public key which some times known as asymmetric systems of both encrypt and descript of data because is the modern way based on factorization, although is much slower but Digital signature capability. We normally use plain texts and Cipher texts.
USES OF CRYPTOGRAPHY
a. Privacy
-it is important to know ways on how to use cryptography so as be confidentially secure on sending and receiving of information
b. Authentication
-This is the situation of own a certain property like yours and not some to be intended as his / hers. In which it is easy to keep data in a safe way of transmissions. All the above ways of using cryptography are normally used by
(i)Governments-
This helps the governments especially on that governance with the computerized system so as to secure their information in order to avoid conflicts and misinformation among the society and their neighbor country.
This helps the governments especially on that governance with the computerized system so as to secure their information in order to avoid conflicts and misinformation among the society and their neighbor country.
(ii) Banks The system of cryptography in Banking is necessary for the monetary system of keeping money, account numbers, credit cards, ATM number cards as well as visa cards securely so as to avoid theft and terrorism on Banks.
(iii)Spies and Personal -Also this system normally used by spies in stopping terrorism and passwords for emailing communication.
CHALLENGES
Although cryptography assumes as the best way and method of keeping and secure information from being interrupted by other people as for privacy purposes, there are some challenges which can be obtained from
(a) Hackers and Crackers
In the system of hiding information, these hackers and crackers can decrypt our data by steal password and finally crack the whole system of algorithms.
(b) Education and technology. In the case of using the system, it needs the skilled people especially the connected one with a higher ideology computer like IT professionals.
(c) Needs highly cost Also this system needs more money or large fund in order to take control of how we can hide and send our data.
(d) Digital divide The system separate people because needs those who are connected and make easy facilitation of data.
References
(i)http://www.wikipedia.com
(ii)Alexander, MD (1993), Protecting Data With Secret Code, Infosecurity News
(iii)Diffi, W and Etal (1976), New Directions in Cryptography, IEEE Transaction on Information theory.
(iv)Meyer, CH, and Etal (1982), Cryptography, A New Dimension in Computer Security. New York, NY.
(v)Kessler, GC. (1998), An Overview of Cryptography
(i)http://www.wikipedia.com
(ii)Alexander, MD (1993), Protecting Data With Secret Code, Infosecurity News
(iii)Diffi, W and Etal (1976), New Directions in Cryptography, IEEE Transaction on Information theory.
(iv)Meyer, CH, and Etal (1982), Cryptography, A New Dimension in Computer Security. New York, NY.
(v)Kessler, GC. (1998), An Overview of Cryptography
Conclusion
Cryptography is the best way of hiding data although there some challenges on the system, so we have study hard and make more research about the system and also we have remembered on changing our password frequently after some days or months
prepared by Venance.
No comments:
Post a Comment