Since the computer was invented the evolution of technology has grown into culture and has been the central of communication since the early 1980s. In order to understand the meaning of encryption and why it is so important, you have to understand why the computer was created and how inventors have continuously improved computer hardware devices. The computer was first invented to calculate numbers and help scientists with different mathematical equations. Then during the world war I, and world war II, Germans were using these computers to encrypt messages over morse code and complicated algorithms. However these algorithms of encryption were easily cracked by United States cryptographers. Over the war many encrypted messages were broken and the German military lost substations, overall control of the war; and eventually surrendering. Safe to say that encryption devices has been a necessity for transmitting data securely and in today’s society personal containment (Crayton & Culp, n.d.). Over the next five decades inventors, of all nationalities, have worked to improve encryption hardware devices from the internal architecture, removable storages, networking devices, and the overall networking security module.
Encryption has different meanings depending on what you context you are using it in, but for the cyber context is means to “convert electronic data into another form, called cipher text, which cannot be easily understood by anyone except authorized parties” (Rouse,
Old in the days, computers were huge in size, hence, not that powerful and relatively slow when compared to computers nowadays. A computer is a complex electrical integrated circuit connects multiple of electrical components together. These components could be summarized in the following; transistors, resistors, capacitors, and diodes. Therefore, when it comes to high tech computers, revolutionary quality is a serious matter. One of the computer quality standards, for example, is the speed at which a computer carries out calculations, this speed is determined by transistors speed. The faster the transistor the better the computer.
Encryption technique is the translation of data into a secret code that will prevent hackers or identity thieves from being able to break or read the data that is sent across the network.
When a fellow general received the message, he would wrap the paper around his corresponding scytale to decipher the message (Tyson 2014). Since the advent of computers though, encryption has become increasing important and relies almost solely on cryptographic means to secure information. When speaking about encryption today, it refers more to the process rather than the mathematical formulas used to scramble data. The basic idea behind encrypting a computer message is such that it is scrambled with a sequence of random bits, known as a key, and only parties with the corresponding key can transpose it back into a comprehensible format. These keys are created via a cipher, otherwise known as an algorithm. When a user sends a message, known as the plaintext, across a network, the computer applies an algorithm to the information to encode it, resulting in a ciphertext (Encryption Basics 2014). This method can be best summarized visually:
Encryption is the conversion of electronic data into another form, called cipher text, which cannot be easily understood by anyone except authorized parties. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play
Moreover, encryption requires use of a key or cipher, which is used to lock and unlock the hidden data. Such a key is necessary to allow the hidden data to be viewed in an intelligible manner by those who are authorized to view it. However, there is always a risk that the encryption key might fall into the wrong hands, thereby allowing the information to be accessed by unauthorized viewers.
Encryption is a process that turns information that is plainly readable into scrambled form in order to preserve the authenticity, integrity, and privacy of the information that passes through the security perimeter (Michael E. Whitman, 2009). It is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties (Rouse, 2014).
Encryption is a method of encoding a message or information before sending it, so unauthorized users can’t access it without permission and only the person who has authorised access to it can decode it. Encryption is used to keep things secure and keep things confidential within the organisation. For example let’s say you have a chat with a friend on Skype, when you’re sending a message to him, that message will display as random symbols until he receives it, which then decodes it and makes it so that only he can read it. This allows the communication to be secure and private, no one will be able to know what the message says.
Encyption takes data and transforms it into unreadable jargon until a key is used to unlock or decrypt the data back to its original form. Due to its near infallibility, encryption is one the most best ways to secure data (Williams & Sawyer, 2015).
What is Enigma? It is a mysterious thing that is hard to understand, even if possible. During World War II, Alan Turing took on the mission to break the code that so many people in Britain thought was impossible. Even though Alan Turing’s childhood was full of misery, he was able to break a seemingly unbreakable code, and became a war hero by saving countless of lives during World War II.
An encryption algorithm takes the original message and encodes it using the encryption key and creates an encrypted message. The only way to retrieve the original message is by decrypting the message using the encryption key. If the encryption key uses a 128-bit key is the same as saying that there are 128² possible key combinations. Algorithms are classified
In 1925, the Germans decided that they wanted a better way to encrypt their messages for the Army and other militaries. They found the ENIGMA, a machine being produced by the Chiffriermaschinen Aktiengesellschaft Company for encrypting messages in a business setting. (Mowry, 1) The Germany Army got a hold of it and adapted it for their purposes. The machine contained a keyboard with all the letters of the alphabet hooked to three
Before the major advances in encryption in the 1970s, it was primarily used by governments and their militaries. It allowed governments to have protected communication with their allies. One government could send encrypted message concerning a common enemy to their ally and if the message was intercepted by that enemy, the message would remain secret and unreadable to the enemy. Militaries used encryption to communicate plans and troop movements and location. The Nazi Army of Germany during World War II developed an encryption that at the time was impossible to decode without the cipher. The Germans could keep track of their extensive submarine fleet in the North Atlantic without fear of the Allies discovering the locations of the submarines.
On the other hand, computers are one of the technologies that changed greatly over time the most. they can make our work easier, well-organized and more convenient than using the old ways of writing and computing files. From bulky computers with CPU, keyboards and mouse, have changed into portable laptops and net book which help us access Internet immediately. Computers are also becoming touch screens. More like tablets today. We better take note that we don’t have to use our mouse or keyboard because they are operated with just a touch of our hand. It feels like we are writing in our notepad, yet so easy.
Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you know what encryption means and the second question I asked was have you ever heard of anybody using encryption. This is a chart of the information I received:
Since the release of Donkey Kong in 1981, platforming-based video games have been concerned with reaching a goal. From the early 1980s to the late 1990s, obtaining the objective fell under a linear, two-point process. For example, in “Super Mario Bros,” the player must guide the plumber to a flagpole in order to complete a level. Once the player completes the thirty-second stage, he achieves the substantial goal of saving the princess. In contrast to the “Mega Man” series, the hero must annihilate eight robot masters before defeating a diabolical, mad scientist. Essentially, the player is tasked to complete an underlying objective before moving to the ultimate goal.