preview

Cryptgraphh

Better Essays

Cryptography
Cryptography
Some data is very sensitive and therefore it has to be hidden away from parties who are not supposed to view it. In this age of computers, their capacity for transfer and retrieval of information may be exploited by other parties to gain access to confidential and potentially dangerous data. Therefore, measures have been taken to ensure that data is not accessed by others which is done by using several methods which, besides physical security, includes the use of encryption algorithms which are programs that change the way information looks by rendering it illegible.
Data encryption is an important part of computing and, if done properly, can provide the user with means through which data can be …show more content…

This complex procedure ensures that the data is safe from being accessed by other parties[4]. Therefore, the key is an important component of the data encryption process since it is the one that makes the data into a unique cipher text that cannot be accessed by other individuals and it is also applied while decrypting the data. The key in computers is measured in bits and if an individual knows the algorithm but does not know the key, the data cannot be accessed algorithmically since the key is a major component to its being decrypted.
The most common method for breaking a cipher is through brute-force attack where the possible combinations of the key are guessed and applied until the right combination is arrived at. Therefore, the longer the key the harder it would be to crack the code.
The personal involvement of Janet as shown by the message which asks her to personally transfer money to her own bank account is suspect. This is in view of the fact that Janet knows the key to Susan’s account and could have used it to transfer the money to her own account. Therefore, the bank could be using the private key encryption system in which the key is known to the business-in this case Janet and to the customer-Susan. The fact that 3DES requires that one knows the key to access information may be the clue to unraveling the truth. Since Janet is supposed to have the key for

Get Access