Thursday, 2 April 2009

CRYPTOGRAPHY
The lesson aimed at helping the student to understand the methods which are used to hide the texts from being understood by other people, who are not concerned with them. The encryption of text is the old style because it started as long as the great Rome Empire existed but the technology were invented by the Egyptians. The subject was interesting as long as the same technology is used today in computer and computer networks to encrypt and decrypt the text which is not to be leaked to unwanted people but those are being done digitaly. The keen thing which we should examine when we want to hide our text is the type of keys we want to use in cryptography .The types of keys to be used are either private or public which are used universaly. Private (secret) keys uses a single key for both encryption and decryption while Public keys uses pair of keys for encryption and another different pair for decryption.
The cryptography in most cases are used in government for securing their information (data), the banking system are using cryptography so as to secure the financial information of the customer in their account numbers, ATM cards, Visa cards etc. Also the spies e.g. FBI, Red scorpions etc. More over the cryptography is used by army to conceal the security information. The most remarkable issue is the use of cryptography is in the Credit card companies and personal e- mails where the users are just assigned with the special secret number which they use in encrypting and decrypting their data.
The cryptography has being subjected into so many challenges which leads to great loss of the information. The very bad behaviors with which the cryptography are that the data may be exposed to crackers who can steal those data and used in sabotages. Further more the digital cryptography needs the skilled personnel whom has to study hard in school so the cost of educating someone, so as to be a professional software engineer, who can assist the whole system. The technology itself is of high cost due to the fact that the devices deployed is of great cost.
References
http://www.wikipedia.com
Alexander,MD (1993), Protecting Data With Secret Code, Info security News

No comments:

Post a Comment