Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Cryptography - School Essays

Cryptography


is the science of encoding a message into a form that is unreadable and making sure only the proper people are capable of decoding the message back into its original form. This is usually done by using an encryption algorithm and a decryption algorithm (these two are often the same) and very often a secret key. Some of the early cryptographic systems did not use a key but instead kept the algorithm itself secret. The message sender uses the encryption algorithm and the key to encode the message, and then sends it to the receiver. The receiver then uses the decryption algorithm and the key to turn back the encrypted message into its original form and read it.
If the message is intercepted ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

and could only be decoded using special staff keys. The key actually consisted of a physical object, which was applied on the message to get the decrypted version of it. In 50 Bc., one of the most simple cryptographic algorithms ever used was the one called the Caesar cipher, that was used by Julius Caesar to send messages to his generals. It consisted simply of switching each letter with the letter that was 3 letters further down the alphabet.
For example "Stephen" would become "Vwhskhq". To decrypt the message, the receivers would simply subtract 3 letters from each letter. This algorithm was later improved and called ROT13, where the letters could be shifted to any number between 1 and 25, and the number of letters shifted was the secret key. This very simple algorithm has been used on Usenet successfully to prevent people from inadvertently reading materials they might find offensive.
Monoalphabetic substitution is another simple step away from the ROT13 algorithm. In ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

developed by the Allies, the key, like in the Vigenere cipher, is based on a little table and a short keyword, which were both changed periodically. The rules used with the table were much more complex and made it fairly safe.

In World War II, however, the Germans gave up on abstract algorithms and came up with a physical encrypting/decrypting machine called the Enigma. It had different wheels of different sizes which were to be tuned differently depending on the date, the different turnings were listed in a little booklet that came with the machine. It wasn't broken before the Allies finally managed to capture enough pieces of the machine and collect enough data from operating ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Cryptography. (2005, December 15). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Cryptography/38010
"Cryptography." Essayworld.com. Essayworld.com, 15 Dec. 2005. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Cryptography/38010>
"Cryptography." Essayworld.com. December 15, 2005. Accessed December 23, 2024. http://www.essayworld.com/essays/Cryptography/38010.
"Cryptography." Essayworld.com. December 15, 2005. Accessed December 23, 2024. http://www.essayworld.com/essays/Cryptography/38010.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 12/15/2005 12:59:15 AM
Category: Technology
Type: Premium Paper
Words: 3143
Pages: 12

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Cryptography
» Cryptographys Importance In Go
» PRIVACY
» A Look At Public Key Encryption
» A Look At Public Key Encryptio
» A Look At Public Key Encryption
» The Necessity Of Computer Secur...
» Law, Policy And Technological D...
» Government Intervention Of The ...
» Internet Firewalls
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved