Cryptography and Security.
Cryptography and Security.
Praful Dixit
December 6, 2010
CRYPTOGRAPHY AND SECURITY
algorithm needed to decipher and understand the message. The practice of encryption is to
encode sensitive data and transmit information securely. Ultimately, it is “possible for sensitive
company information and private customer information to be tracked and gathered and stolen
online, including sensitive information that could be exploited if it ends up in the wrong hands,”
(Suciu, 2009). Encryption is a way to protect sensitive information even if unauthorized persons
gain access.
The types of cryptography are substitution and transposition and can include secret key,
public key and hash function as method of replacement. Substitution involves exchanging the
characters in the message with other characters. Transposition involves mixing the characters in
Strong cryptography starts with a strong algorithm. Randomize, secure and expire the key
algorithm to ensure the potency of the algorithm. Encryption can work on several layers of the
OSI model, including application, presentation, transport and is capable of encryption at any
layer of the OSI model. Encrypt anytime you want to keep data or transmissions confidential, for
email, data transfer, network traffic and stored data among other uses.
Conclusion
sensitive data and transmit information securely. The types of cryptography are substitution and
transposition. Strong cryptography starts with a strong algorithm. Randomize, secure and expire
References
http://technology.inc.com/security/articles/200609/encryption.html.