preview

Cryptography : Applied Cryptography Rough Draft

Better Essays

Running Head: Cryptography 1 Cryptography 12

Applied Cryptography Rough Draft
ISSC 431
Professor Christopher Weppler
October 6, 2015

Introduction
Over the years, cryptography has been used to protect secrets, in a military capacity to make sure that either hackers, enemies of the countries, do not intercept sensitive formation. Ciphers, and encryption blocks are becoming so hard to break even the best super computers cannot break the codes in a timely fashion. Encryption has been improved over the years, also has been around for thousands of years and this paper is intended to explain about different forms of cryptography that either has been used or is still in use to this day. This paper is about …show more content…

When coming to creating these types of security is predominately affiliated with the military, federal agencies, governments and so forth. When talking about computer security cryptography this started back in the 60?s and this came from a huge demand for the civilian sector to protect critical information and to transform data into a digital form. Years later in the 70?s IBM took up the contract and started to create an encryption system for communication systems, and that was known as DES (Digital Encryption Standard). Now with that being said let 's discuss about identification/ entity authentication technique. There are differences between identification and entity authentication, states about weak, strong and zero knowledge-based authentication. Entity authentication procedure is in ?actual time? procedure in the sense that provides a guarantee that the parties that are involved in carrying out some of the action of validation is functioning at the time of protocol execution. When passwords come to entity authentication would be considered a weak authentication. When coming to conventional password schemes that involve time natural outlines, which involved so-called weak authentication general is between 6 to 10 characters and is a dictionary word. According to this passage ?Conventional password schemes involve time-invariant passwords, which provide so-called weak authentication. (Menezes & Oorschot & Vanstone, 1996) Now, when coming to

Get Access