.

Monday, April 22, 2019

Understanding Cryptography Essay Example | Topics and Well Written Essays - 1000 words

Understanding Cryptography - Essay ExampleCryptography is someway omnipresent going beyond the conventional environments such as banking systems, government communications among others (Christoff, 2009). Cryptography is like a shot used in web browsers, cell phones, e-mail programs, embedded software, manufacturing systems, cars, medical plants, smart buildings among others (Christoff, 2009).Therefore, designers and system users enquire to understand comprehensively the concept of cryptography and how it is applied in order to appreciate its effectiveness in securing wireless networks and communication.According to Christoff (2009), cryptography is the study and practice of techniques for securing communication particularly in the presence of a threesome party (adversary). Essentially, cryptography is in general concerned with the development and determining protocols that protect against the influence of third parties in communication and networking. It also analyzes protocols and mechanisms that are related to information security aspects including data integrity, confidentiality, non-repudiation and authentication (Paar & Pelzl, 2010). oer the years, various techniques similar to encryption have been used as cryptography. However, modern cryptography borrows from disciplines of computer science, math and electrical engineering among others. Cryptography is predominantly used in computer passwords, e-commerce, and ATM cards. It employs several tools and techniques to apply the security needed for the various applications (Christoff, 2009).OpenSSL is one of the tools of cryptography that implements the SSL and the TSS security protocols in the network (Viega, Messier, & Chendra, 2002). It is mainly used in many web servers to transmit packets in encrypted form rather than in apparently readable text. Open SSL has a core library that is developed in C programming linguistic communication and is used for the implementation of the basic cryptographic fun ctions and the

No comments:

Post a Comment