Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

              CRYPTOGRAPHY ENCRYPTION   NAME:   INSTITUTION: My document overview and abstract There methods which have been used by different organizations so as to ensure that their data is encryp

CRYPTOGRAPHY ENCRYPTION

NAME:

INSTITUTION:

My document overview and abstract

There methods which have been used by different organizations so as to ensure that their data is encrypted. In my document below I am going to look at cryptography as a means of encryption. In the entire history the need for encryption of data began in the years of 1980 which made sure that the data of companies and also individual businesses was much protected. The coming of the internet was the one that speeded up the process of need to encrypt data. Then the issue of encryption was made a new strategy to make sure that the data was protected in 1989. (Sammy, V 2014)

The term cryptography

This can be said to be a science or also the method which are used then coming up with messages or even the concealing of these messages. This method can be said to be very expansive and has an importance when it comes to preparation of cloud information. (Frozen, A. D. 2017)

This method is very effective like the modern day methods of encryption which involve calculations which are used to make sure there is security when data is exchanged through different computer systems and other means. This method is used to make sure that messages which were sent at that time were shrouded in a way. (Rebury, G. 2012)

Encryption as a term.

This can be said to be part of a component which is used in cryptography and it makes sure that the data and information is well concealed through converting it using the codes which are undecipherable. This means uses keys and also parameters which are set to make sure that information is well changed. It is important to note that when looking at some means of encryption methods codes are as long as the message which have been used and is being sent while in others the encryption is a bit shorter. The encryption process can be said to be the inverse process of the message which has been sent also. When information reaches the sender then the sent information in now decoded being the first act. This encryptions and encoding of data is usually done particularly when the data that is being through the channels that are not very reliable and can sometimes be hacked of even bleached example is the worldwide webs. Also encryptions are made when data is being sent through gadgets that may be hacked which includes the mobile phones and the ATM machines used particularly in the banking sector among other machines.

The figure and how it worked

This can be said to be a well arranged and performed calculation, steps or methods this are used when carrying out the tasks of encrypting data and also deciding it. This also can be said to be the specific routes which are followed after the encoding and decoding of texts. This method highly depends on the keys that were used for the decoding.

The plain messages versus cipher messages

These are the alternates and have the opposite meaning of each other. Plain messages which are also as plaintexts also can be said to be any data and information before it is encoded. The cipher messages and also known as cipher texts is the figure which has been used for the encryption.

The cryptanalysis

So as to stay with the maximum security in the countries, different governments have employed experts who ensured that their data is well encrypted. The cryptanalysis is a mean and also the routes which also translate hard constituents such as the codes and also the figure graphs. These are the means which are used to ensure that the data security is improved and also the cryptography which was used in the past. This cryptanalysis was a means of cryptanalysis which was also during the world war.

The cryptography which has been recorded.

In the antiquate Egypt nation

This was first used in about 4000 years ago where the segments of this cryptography was used in Egypt town where a person known as Khnumphotep had his tomb drawn the life of the lord. He is said to have drawn hieroglyphics which used a few images which were bizarre to show how the grave was important. This cryptographic encryption was a method known as encryption where by many images were used where an image was used to mean another one.

The purple machine has also been recorded.

There was a machine for encryption which was called the purple and it was used to steer the signals for mobiles. The allied powers were trying to bleach this machine but it was hard. This was among the most powerful machine which was invented by Japanese and up to today there is no purple machine which has ever been invented. (Martin, D. 2013)

The encryption machine for the puzzles.

When the First World War was ending, the scherbius invented this machine which was highly electromagnetic. This machine was used then encrypting and decoding messages which were termed as being mysterious. This machine was also called enigma which had few set ups which were riggings and also rotors.

References

Sammy, V (2014). Visual cryptography. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 1-12). Springer, Berlin, Heidelberg.

Frozen, A. D. (2017). Cryptography & network security. McGraw-Hill, Inc...

Rebury, G. (2012). Quantum cryptography. Reviews of modern physics, 74(1), 145.

Martin, D. (2013). Elliptic curve cryptography (pp. 397-397). Springer US.

Show more
  • @
  • 4395 orders completed
ANSWER

Tutor has posted answer for $10.00. See answer's preview

$10.00

************ ENCRYPTIONNAME:INSTITUTION:My document ******** and ************* ******* ***** **** **** **** ** ********* organizations so as to ****** **** ***** **** ** encrypted ** ** document below I am ***** to **** at ************ ** * ***** ** ********** ** *** ****** ******* *** **** for ********** ** data ***** ** *** ***** of **** ***** **** **** **** the data of companies *** **** ********** businesses was much ********* *** ****** ** the ******** *** the one **** ******* ** *** ******* ** **** ** ******* **** **** *** ***** ** ********** *** **** * new ******** ** **** **** that *** **** *** ********* ** **** ****** * 2014)The **** **************** *** be said ** be * ******* or **** the ****** which *** used **** coming ** **** messages ** even the ********** ** ***** messages **** method can be **** ** ** **** ********* *** *** ** ********** when it ***** to preparation ** ***** *********** ******* A * ********* ****** ** very ********* **** the ****** *** ******* of encryption which ******* ************ which *** **** to **** **** there ** ******** **** **** ** ********* ******* ********* ******** systems *** other ***** This ****** is **** ** make sure **** ******** which were **** ** **** **** **** ******** in a *** (Rebury * 2012)Encryption ** * ******** *** ** **** to be **** of * ********* which is **** ** cryptography *** ** ***** **** **** *** **** *** *********** ** **** ********* through ********** it ***** *** codes ***** *** ************** **** ***** **** **** *** also ********** ***** *** set ** make **** **** *********** ** **** changed ** is ********* ** **** **** **** ******* at **** ***** ** ********** ******* codes are as **** as *** ******* which **** **** **** *** is ***** **** ***** ** others *** encryption ** a *** ******* *** ********** ******* *** ** said to ** *** inverse process of the message ***** *** **** sent **** **** *********** reaches *** sender **** *** **** *********** ** *** ******* ***** *** ***** *** **** encryptions *** ******** of **** ** usually done ************ **** *** data that is ***** ******* *** ******** **** are *** **** ******** *** *** sometimes ** ****** ** even bleached example is *** ********* **** Also *********** *** made when **** is ***** **** ******* ******* **** *** ** ****** which ******** *** ****** ****** and *** *** ******** **** ************ in *** ******* ****** among ***** *********** figure and how ** ********** *** ** **** ** be * **** ******** *** performed *********** ***** ** ******* this are used **** carrying *** *** ***** ** encrypting **** and **** ******** ** This **** *** ** **** to be *** ******** ****** ***** *** followed ***** *** ******** *** decoding of ***** **** method highly ******* on the **** **** were used *** *** *********** ***** ******** ****** cipher ************* *** the ********** *** have *** ******** meaning ** **** ***** ***** ******** ***** are **** as plaintexts also *** ** **** to be any **** and *********** before ** ** ******* *** ****** messages and **** known ** ****** ***** is the ****** which *** **** used *** *** ************* *************** as ** stay with *** ******* security ** *** ********* ********* *********** have ******** ******* *** ******* that ***** **** is **** ********* The ************* ** * **** and **** *** routes ***** **** ********* hard constituents **** as *** codes *** also *** figure ****** ***** *** *** means ***** *** **** to ensure **** *** **** security is ******** and **** the ************ which *** **** ** *** **** **** ************* *** a means ** cryptanalysis ***** *** also ****** *** ***** warThe ************ which *** **** ********** *** antiquate ***** ********** *** ***** **** ** ***** **** ***** *** where *** segments ** **** ************ *** used in Egypt **** ***** * ****** ***** ** *********** had his **** ***** *** **** ** the lord ** is **** ** **** ***** ************* ***** **** a *** ****** which **** ******* ** show *** *** grave *** ********* **** ************* encryption was * method ***** ** ********** ***** ** many ****** were used where ** ***** *** **** ** mean another ****** purple ******* *** **** **** recordedThere was * ******* for encryption ***** was called the purple *** it *** **** ** ***** *** ******* *** ******* *** ****** ****** were trying ** ****** this machine *** ** *** **** This *** ***** *** most ******** ******* ***** *** ******** ** Japanese *** ** ** ***** ***** is ** ****** ******* ***** *** ever **** invented ******* D ******** encryption machine *** *** *********** the First ***** *** *** ****** the ********* invented **** machine ***** *** highly *************** **** ******* was **** **** ********** *** ******** ******** ***** **** ****** ** being ********** **** ******* *** also ****** enigma ***** *** few *** *** ***** **** ******** *** also ********************* V (2014) ****** ************ ** ******** on *** ****** *** *********** ** ************* ********** *** ***** ******** Berlin **************** * * ****** ************ ***** ******* security McGraw-Hill ********* * (2012) Quantum ************ ******* ** ****** ******* ***** ********* * ****** ******** ***** ************ *** 397-397) ******** **

Click here to download attached files: CRYPTOGRAPHY ENCRYPTION.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question