Information Theory and Cryptography - Essay Example

Only on StudentShare

Extract of sample
Information Theory and Cryptography

In the present context, with the advent of computers in every aspect of daily routines of individuals and organizations in the 21st century, large amounts of information have to stored in or transmitted through unsafe media. It becomes essential that such information is not accessible to those who are not privy to it. Thus, to this effect of lending exclusivity to information stored or transmitted, the science of cryptography today has pervaded all areas of information technology today.
Towards these ends three types of cryptographic schemes are generally used today. The algorithms utilized in these schemes are described by the number of keys used to encrypt and decrypt data and additionally by their applications.
Public Key Cryptography (PKC) - These are asymmetric algorithms that use two keys - one key to encrypt and another to decrypt. One key is called the public key which may be advertised to all and sundry while the other is called the private key and this is only available to privy entities. It does not matter which key is used to encrypt or decrypt but the end-effect is the encryption allows the information to remain exclusive.
Hash Function (One-Way Cryptography) - These algorithms have no key and they allow the plaintext to be encrypted once into ciphertext that is not recoverable. ...Show more

Summary

Information theory can be defined as the mathematical aspect of processing data so that it can be communicated across different media. Such data processing can be compression of computer files, error-correcting codes such as those used in DVD players, digital television, etc…
Author : corkeryeloy
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Information Theory and Cryptography"
with a personal 20% discount.
Grab the best paper

Related Essays

Quantum: Computing the Future
According to this paper the large volume of computing processing capabilities has been produced by high speed processing machines. This paper presents a detailed analysis of quantum computing. Moreover, the quantum computing is basically based on the ideas of quantum physics.This paper discusses the role of quantum computing, its history and future developments.
21 pages (5250 words) Research Paper
Information Security Essay
There are various methods and approaches that can be used to solve this problem. Technology forms one of the backbones. The effectiveness of this approach and others will be examined in detail in the essay below.1 Information security may be defined as a process of protecting ones data.
20 pages (5000 words) Essay
Information Technology
Gray & Larson (2006) explains the major Benefits of the Information System are described in following bullet points to understand the importance of Information System and why this is essential in today's corporate infrastructure: IS provides automated template for introducing new business process with affecting legacy system.
9 pages (2250 words) Essay
Information Communication Technology Essay
One such invention is the advent of the Information Communication Technology (ICT)". This is actually a wide subject that covers communication apparatus and their applications. ICT covers the electronic media including televisions, radio, cell phones, internet and computer (both software and hardware aspects), the satellite system as well as all applications that are related to these machinery.
8 pages (2000 words) Essay
Cryptosystems Based on Discrete Logarithm
When we transfer a data over the internet, we sometimes need to encrypt it with the help of some cryptosystem so that no one except the sender and the receiver may know it. Thus the character 'A' will not be sent as the binary string corresponding to the number 161.
4 pages (1000 words) Essay
Information Systems and Security
At the present time, there are better ways to communicate, transfer data, information retrieval as well as distribution, dealing and especially online business, but all these improvements in the fields of information technology also brought the challenges regarding the security.
8 pages (2000 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT