Information Theory and Cryptography - Essay Example

Only on StudentShare

Extract of sample
Information Theory and Cryptography

In the present context, with the advent of computers in every aspect of daily routines of individuals and organizations in the 21st century, large amounts of information have to stored in or transmitted through unsafe media. It becomes essential that such information is not accessible to those who are not privy to it. Thus, to this effect of lending exclusivity to information stored or transmitted, the science of cryptography today has pervaded all areas of information technology today.
Towards these ends three types of cryptographic schemes are generally used today. The algorithms utilized in these schemes are described by the number of keys used to encrypt and decrypt data and additionally by their applications.
Public Key Cryptography (PKC) - These are asymmetric algorithms that use two keys - one key to encrypt and another to decrypt. One key is called the public key which may be advertised to all and sundry while the other is called the private key and this is only available to privy entities. It does not matter which key is used to encrypt or decrypt but the end-effect is the encryption allows the information to remain exclusive.
Hash Function (One-Way Cryptography) - These algorithms have no key and they allow the plaintext to be encrypted once into ciphertext that is not recoverable. ...
Download paper

Summary

Information theory can be defined as the mathematical aspect of processing data so that it can be communicated across different media. Such data processing can be compression of computer files, error-correcting codes such as those used in DVD players, digital television, etc…
Author : corkeryeloy

Related Essays

Quantum: Computing the Future
This work shows us that quantum computing is the discipline of computer technology and systems, which is focused on developing computer technology based systems foundational upon the standards of quantum theory that clarifies the performance and characteristics of energy and material on the quantum (subatomic as well as atomic) stages. Quantum computing is a result of a combination of mathematics domain, physics discipline and computer science knowledge, and it has been developed in the previous two decades from creative thoughts to an imperative charming domains of quantum mechanics. A...
21 pages (5271 words) Research Paper
Information Security Essay
It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2
...
20 pages (5020 words) Essay
Information Technology
It helps system in smooth change by adopting change and configuration management process (Gray & Larson, 2006).
...
9 pages (2259 words) Essay
Information Communication Technology Essay
Accessing information is very efficient by use of these means. The European commission affirms that the importance of the Information Communication Technology is not exactly the technology aspect of it but rather the capacity to increase the access to information and be able to serve all the populations that are underserved by these facilities. Many nations have come up with organizations that carry out promotions of ICT since the areas that are disadvantaged in terms of technology are feared to lag behind. Concentrating on technology will only aggravate the problem. On the other hand the free...
8 pages (2008 words) Essay
Cryptosystems Based on Discrete Logarithm
Rather it will be sent as the binary string corresponding to another number which depends on the number 161 according to some fixed rule. For example we can subtract 161 from the largest 3-digit number 999 and send the result 838. Thus the rule for encryption is:
...
4 pages (1004 words) Essay
Web Based Instructional Intervention and Information Literacy.
Web-based instruction strategies employ the Internet in delivering instructional information. A current teaching method can be supported by web-based instruction can support an existing teaching method or computer-based instructional methods can be used instead of the existing method of teaching. These act as an extension of colleges and universities, businesses, teachers, and/or parents in providing learning opportunities to various individuals such as students and employees.
...
90 pages (22590 words) Dissertation
Information Systems and Security
Information Systems and Security
...
8 pages (2008 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!