Question

In: Computer Science

What is an example of a cryptography technology? How is it used or misused?

  • What is an example of a cryptography technology?
  • How is it used or misused?

Solutions

Expert Solution

Cryptography or cryptology is the training and investigation of techniques for secure communication within the sight of third parties called enemies. All the more for the most part, cryptography is tied in with building and examining protocols that keep third parties or the general population from perusing private messages; different perspectives in information security, for example, data confidentiality, data integrity, authentication, and non-repudiation are fundamental to current cryptography. Present day cryptography exists at the crossing point of the orders of arithmetic, computer science, electrical engineering, communication science, and physics. Utilizations of cryptography incorporate electronic business, chip-based installment cards, digital currencies, computer passwords, and military communications.

Cryptography preceding the cutting edge age was adequately synonymous with encryption, the change of information from a meaningful state to obvious nonsense. The originator of an encrypted message shares the disentangling system just with proposed recipients to block access from enemies. The cryptography writing regularly utilizes the names Alice ("A") for the sender, Bob ("B") for the expected recipient, and Eve ("eavesdropper") for the enemy. Since the improvement of rotor figure machines in World War I and the approach of computers in World War II, the strategies used to do cryptology have turned out to be progressively mind boggling and its application increasingly broad.

Current cryptography is vigorously founded on scientific hypothesis and computer science practice; cryptographic calculations are planned around computational hardness presumptions, making such calculations difficult to break practically speaking by any enemy. It is hypothetically conceivable to break such a framework, however it is infeasible to do as such by any known commonsense methods. These plans are consequently named computationally secure; hypothetical advances, e.g., upgrades in whole number factorization calculations, and quicker figuring technology require these answers for be constantly adjusted. There exist information-hypothetically secure plans that provably can't be made back the initial investment with boundless registering power—a precedent is the one-time cushion—however these plans are more hard to use by and by than the best hypothetically brittle yet computationally secure instruments.

The development of cryptographic technology has raised various legitimate issues in the information age. Cryptography's potential for use as an instrument for secret activities and dissidence has driven numerous legislatures to order it as a weapon and to confine or even deny its utilization and fare. In certain wards where the utilization of cryptography is legitimate, laws grant agents to force the divulgence of encryption keys for archives applicable to an examination. Cryptography additionally assumes a noteworthy job in digital rights the board and copyright encroachment of digital media.

cryptography is related with the way toward changing over common plain content into incomprehensible content and the other way around. It is a technique for putting away and transmitting data in a specific structure with the goal that those for whom it is proposed can peruse and process it. Cryptography shields data from burglary or modification, however can likewise be utilized for client authentication.

Depiction: Earlier cryptography was successfully synonymous with encryption yet these days cryptography is essentially founded on scientific hypothesis and computer science practice.

Present day cryptography worries with:

Confidentiality - Information can't be comprehended by anybody

Integrity - Information can't be modified.

Non-repudiation - Sender can't deny his/her expectations in the transmission of the information at a later stage

Authentication - Sender and recipient can affirm each

Three kinds of cryptographic techniques utilized when all is said in done.

1. Symmetric-key cryptography

2. Hash capacities.

3. Public-key cryptography

Cryptography is use in numerous applications like financial exchanges cards, computer passwords, and internet business exchanges.

Misuse

  1. Crypto libraries are widely available •
  2. Developers still lack knowledge of crypto basics
  3. Default black-box use leads to vulnerabilities
  4. Secret communications may be criminal or even treasonous[citation needed]. Because of its facilitation of privacy, and the diminution of privacy attendant on its prohibition, cryptography is also of considerable interest to civil rights supporters.

Related Solutions

Discuss how technology is used and related to boundary-less in police activities. Include an example in...
Discuss how technology is used and related to boundary-less in police activities. Include an example in your response. please provide a source
For each project, provide a description of the technology, how it is used and for what...
For each project, provide a description of the technology, how it is used and for what purpose ( benefits), its functions/features, and details (screen shots and descriptions). - Using a keylogger -Scanning for Malware using the Microsoft -Creating a Virtual Machine -Examining Data Breaches- Visual The intent is for someone to be able to review your work and have a good understanding of what the technology does, its functions/features, and see it actually in use.
What is a coverage ratio? Give an example. How is it used?
What is a coverage ratio? Give an example. How is it used?
What is CreERT2? Give an example of how it can be used
What is CreERT2? Give an example of how it can be used
how is technology used for decision making?
how is technology used for decision making?
what is Blockchain technology, and how can it be used in organizations and industries to create...
what is Blockchain technology, and how can it be used in organizations and industries to create value?
What issue or challenge the retailer wished to solve, how they used the technology and the...
What issue or challenge the retailer wished to solve, how they used the technology and the outcome. Close by sharing any common challenges among the retailers and how the solutions may relate to GTR.
What is meant by "cloud technology" or "cloud computing" and how can it be used to...
What is meant by "cloud technology" or "cloud computing" and how can it be used to implement lean management principles in a supply chain?
Cryptography is used heavily in internet communications. True or false? Explain
Cryptography is used heavily in internet communications. True or false? Explain
how can technology be used for healthcare compliance?
how can technology be used for healthcare compliance?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT