Está en la página 1de 3

CRYPTOGRAPHY AND SECURITY

Running head: CRYPTOGRAPHY AND SECURITY

Cryptography and Security.

David “Toby” Meyers

CMGT/244 - Intro to IT Security

Praful Dixit

December 6, 2010
CRYPTOGRAPHY AND SECURITY

Cryptography and Security

Cryptography is the concept of making messages unreadable to anyone without a key

algorithm needed to decipher and understand the message. The practice of encryption is to

encode sensitive data and transmit information securely. Ultimately, it is “possible for sensitive

company information and private customer information to be tracked and gathered and stolen

online, including sensitive information that could be exploited if it ends up in the wrong hands,”

(Suciu, 2009). Encryption is a way to protect sensitive information even if unauthorized persons

gain access.

The types of cryptography are substitution and transposition and can include secret key,

public key and hash function as method of replacement. Substitution involves exchanging the

characters in the message with other characters. Transposition involves mixing the characters in

the message with other characters within the message.

Strong cryptography starts with a strong algorithm. Randomize, secure and expire the key

algorithm to ensure the potency of the algorithm. Encryption can work on several layers of the

OSI model, including application, presentation, transport and is capable of encryption at any

layer of the OSI model. Encrypt anytime you want to keep data or transmissions confidential, for

email, data transfer, network traffic and stored data among other uses.

Conclusion

Cryptography makes messages unreadable to anyone without a key algorithm to encode

sensitive data and transmit information securely. The types of cryptography are substitution and

transposition. Strong cryptography starts with a strong algorithm. Randomize, secure and expire

the key algorithm to ensure the potency of the algorithm.


CRYPTOGRAPHY AND SECURITY

References

Suciu, (2009). The Basics: What is Encryption?

Retrieved December 6, 2010 from: technology. inc.com,

http://technology.inc.com/security/articles/200609/encryption.html.

También podría gustarte