Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
A Look At Public Key Encryptio - Term Papers

A Look At Public Key Encryptio


n
Encryption is the process of disguising information by transforming plain text into gibberish, or ciphertext, which cannot be understood by an unauthorized person. Decryption is the process of transforming ciphertext back into plaintext that can
be read by anyone. Example of encryption can be found in history,
for example in the era of the Cold War, the Solviet Union and the
United States would send electronic messages to one military
point to another, encrypted. If the enemy intercepted the
message, they would have to crack this message to get the
information. Typically when governments used encryption they used
a very complex method of encrypting messages. Encryption does not
have to ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

knows the key
can easily switch the H back to a D, the V back to an R, and
figure out where to meet. Theses two examples are on opposite
sides of the spectrum, but both have their similarities and their
differences.
The major difference complexity, the government pays
mathematicians to research complex algorithms by which to encode
the messages, like the system used by Captain Video but these
algorithms are complex enough that if you tried to crack them it
would take you decades with even the most powerful computer
today. This complex mathematical code is what makes the text
secure to anyone who tries to crack it. Some similarities we can
find in these two examples are their use of the key, the
unlocking instructions, to decode the message. They only used one
key to encrypt and decrypt the messages. This creates problems,
security problems. The single key must itself be kept very
secret, while somehow still being transmitted to the person
receiving encoded ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

A Look At Public Key Encryptio. (2007, November 27). Retrieved December 23, 2024, from http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryptio/74946
"A Look At Public Key Encryptio." Essayworld.com. Essayworld.com, 27 Nov. 2007. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryptio/74946>
"A Look At Public Key Encryptio." Essayworld.com. November 27, 2007. Accessed December 23, 2024. http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryptio/74946.
"A Look At Public Key Encryptio." Essayworld.com. November 27, 2007. Accessed December 23, 2024. http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryptio/74946.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 11/27/2007 03:01:17 AM
Category: Miscellaneous
Type: Premium Paper
Words: 1215
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» General Electric Business Analy...
» Learning CPR
» Personal Writing: My Vacation A...
» George W. Bush
» Beowulf
» The Taiwanese Development Model...
» The Adventures Of Huckleberry
» The Use of Grammatical Theory
» Article Critique: Building Bloc...
» Scarlet Letter Critique
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved