StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cryptography Application Methods - Research Paper Example

Cite this document
Summary
Business enterprises predominantly use cryptography during their storage and transmission of messages carefully for reading by the intended recipients. Cryptography has several…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Cryptography Application Methods
Read Text Preview

Extract of sample "Cryptography Application Methods"

Cryptography Application Methods Cryptography Application Methods Cryptography is the process of transforming a text that is clearinto incomprehensible format. Business enterprises predominantly use cryptography during their storage and transmission of messages carefully for reading by the intended recipients. Cryptography has several applications and methods. In the past, it was used in assuring secrecy. The authenticity of the sender and integrity of the media were secured through the use signatures, wax, and other physical attributions.

However, the introduction of electronic transfer transformed the use of cryptography into electronic cash. This led to the emergence of debit and credit cards whose applications have since become widespread. This age of information has witnessed the emergence of cryptography a major protection method of applications. This paper will investigate some of the application methods of cryptography together with the systems application in a college university. In a university setup, cryptography has applications in ensuring secrecy in storage, integrity in transmission, authentication of identity and integrity in storage.

Secrecy in storageThe maintenance of the secrecy in storage requires a one key system whereby the user is responsible for the provision of the computer key at the start of the session. After this, the computer takes care of the decryption and encryption during the entire course of its normal use. Indeed, there are numerous hardware devices for automatic encryption of personal computers of all the information that the disk stores. Upon turning on a computer, a user must provide the encryption hardware with a key.

Otherwise, the information will be meaningless even in the event that the hard disk is stolen. However, secrecy in storage is not without problems. In an event that the user forgets the key, then the encryption information become unusable. Apparently, encryption only occurs while the information is in storage and not when it is in use. Integrity in transmissionThe electronic money transfer has the danger of invasion by criminals who can tap a system and make false transfers. However, to realize integrity in the transfer of funds, there is need to perform an information checksum before submitting it in the form of encryption.

Upon the receipt of this encrypted information, another checksum takes place for comparison after decryption. An agreement of the checksum is an indication that an alteration had occurred to the message. Forging this kind of information is easy. Since a lot of publications and intellectual works occur in universities, integrity in the transmission of this kind of information can be of great help (Delfs & Knebl, 2007). Credentialing systemsA credential is a document that references a trusted party while introducing one party to the other.

It occurs through credentialing a claim by the use of electronic credentials. This helps in verifying information electronically. Today, a lot of information is being integrated into the systems of the smart card. For a university, the electronic credentials can be of great need in verifying information from its partners or within its ranks. Electronic signaturesThese are the modes of offering transactions involving two or more parties in a legally binding way. They are normally tricky to forge but easy to use (Martin, 2012).

Besides, the law accepts them as binding. Electronic signatures come in handy when the business dealings are acute and the parties involved are located in different locations from each other. Most universities run exchange programs with their counterparts in far distance lands. In this way, electronic signatures can make the transactions involving programs easier. ReferencesDelfs, H., & Knebl, H. (2007). Introduction to Cryptography: Principles and Applications. Berlin ; New York : Springer.Martin, K. M. (2012). Everyday Cryptography: Fundamental Principles and Applications.

Oxford ; New York: Oxford University Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1613969-cryptography-application-methods
(Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/miscellaneous/1613969-cryptography-application-methods.
“Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1613969-cryptography-application-methods.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cryptography Application Methods

Scientific Method in Primary Research

Scientific methods in Primary Research Date Scientific methods in Primary Research Hypothesis is a tentative explanation in research awaiting approval after the research.... In designing the experiment, the researchers did comply with the scientific methods as all the important areas of doing a scientific study were covered....
3 Pages (750 words) Admission/Application Essay

Biophisics

Another way to reach equilibrium is by generating initial methods using the Monte Carlo (MD) method. Quantities fluctuate around average values.... Another way to reach equilibrium is by generating initial methods using the Monte Carlo (MD) method.... olecular dynamics: Classical to Quantum methods, Perla Balbuena, Jorge....
1 Pages (250 words) Admission/Application Essay

The Thoughts About Empirical Methods by Many Philosophers Worldwide

The paper presents the process of testing and proving the truth in empirical methods.... Empirical methods have for long been subject to debates as to how to be believed or stated as to whether true or false.... rdquo; I believe that Khun nad Quine will be in agreement with Popper's idea of characterizing empirical methods.... They would agree with this statement since they too have written similar accounts of characterizing empirical methods....
1 Pages (250 words) Admission/Application Essay

The Truthfulness of Empirical Methods According to Delanty & Strydom

This paper focuses on empirical methods.... There seem to be different ways in which to test the truthfulness of empirical methods.... Thomas Kuhn would agree completely with this idea that 'What characterizes the empirical method is its manner of exposing to falsification, in every conceivable way, the system to be tested....
1 Pages (250 words) Admission/Application Essay

Personality and Blood Type

The study Personality, blood type, and the five-factor model was carried out by Kenneth Cramer and Eiko Imaike in 2000; the study was revised by the authors in 2001 and accepted during the same year, but was not published until 2002.... According to the topic covered through… Different studies have continued to explore the relationship between the two, despite the fact that there is no consensus about The current study, Personality, blood type, and the five-factor model explored seven hypotheses formulated from previous studies, based on the five-factor model of personality....
5 Pages (1250 words) Admission/Application Essay

Health Consequences from Exposure to Tetrachloroethylene

It is usually in liquid form and is colourless.... The chemical is mainly used for dry-cleaning of fabrics and people usually refer to it as “dry-cleaning fluid.... ?? Tetrachloroethylene is a potent solvent for organic… The chemical nature of this chlorocarbon causes it to be an important agent in various industries....
8 Pages (2000 words) Admission/Application Essay

Relay Graduate School of Education

By introducing different methods that are participatory to the students, the teachers make the students feel part of the class and seem to enjoy it.... Moreover, the way the teachers use routines; including Frank and Yasmine is fun for the students and I will definitely use such methods in my classroom.... At the ends, he gives the students a real example on the application of trigonometry....
2 Pages (500 words) Admission/Application Essay

Ground Water Well Drilling

The author of the report discusses the procedures of the different drilling techniques and gives the advantages and disadvantages of these techniques with special reference to the types of strata in which a particular method is suitable or not suitable… All the methods have certain advantages and disadvantages and the strata condition is the deciding factor for adopting any specific method for drilling....
5 Pages (1250 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us