0% found this document useful (0 votes)
55 views

Cryptography and Security.

Cryptography involves encoding messages to make them unreadable without a key. It allows sensitive data and information to be securely transmitted. There are two main types of cryptography: substitution, which exchanges characters for other characters, and transposition, which mixes characters within the message. Strong cryptography relies on a strong algorithm, and randomizing, securing, and expiring keys helps ensure the potency of the algorithm over time. Encryption can be used at various layers of the OSI model to keep data and transmissions confidential.

Uploaded by

Toby Nixon
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Cryptography and Security.

Cryptography involves encoding messages to make them unreadable without a key. It allows sensitive data and information to be securely transmitted. There are two main types of cryptography: substitution, which exchanges characters for other characters, and transposition, which mixes characters within the message. Strong cryptography relies on a strong algorithm, and randomizing, securing, and expiring keys helps ensure the potency of the algorithm over time. Encryption can be used at various layers of the OSI model to keep data and transmissions confidential.

Uploaded by

Toby Nixon
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CRYPTOGRAPHY AND SECURITY

Running head: CRYPTOGRAPHY AND SECURITY

Cryptography and Security.

David “Toby” Meyers

CMGT/244 - Intro to IT Security

Praful Dixit

December 6, 2010
CRYPTOGRAPHY AND SECURITY

Cryptography and Security

Cryptography is the concept of making messages unreadable to anyone without a key

algorithm needed to decipher and understand the message. The practice of encryption is to

encode sensitive data and transmit information securely. Ultimately, it is “possible for sensitive

company information and private customer information to be tracked and gathered and stolen

online, including sensitive information that could be exploited if it ends up in the wrong hands,”

(Suciu, 2009). Encryption is a way to protect sensitive information even if unauthorized persons

gain access.

The types of cryptography are substitution and transposition and can include secret key,

public key and hash function as method of replacement. Substitution involves exchanging the

characters in the message with other characters. Transposition involves mixing the characters in

the message with other characters within the message.

Strong cryptography starts with a strong algorithm. Randomize, secure and expire the key

algorithm to ensure the potency of the algorithm. Encryption can work on several layers of the

OSI model, including application, presentation, transport and is capable of encryption at any

layer of the OSI model. Encrypt anytime you want to keep data or transmissions confidential, for

email, data transfer, network traffic and stored data among other uses.

Conclusion

Cryptography makes messages unreadable to anyone without a key algorithm to encode

sensitive data and transmit information securely. The types of cryptography are substitution and

transposition. Strong cryptography starts with a strong algorithm. Randomize, secure and expire

the key algorithm to ensure the potency of the algorithm.


CRYPTOGRAPHY AND SECURITY

References

Suciu, (2009). The Basics: What is Encryption?

Retrieved December 6, 2010 from: technology. inc.com,

http://technology.inc.com/security/articles/200609/encryption.html.

You might also like