COURSE CODE: IT311 - Information Assurance and Security: Cryptography To The Rescue
COURSE CODE: IT311 - Information Assurance and Security: Cryptography To The Rescue
Security
Module 4
Introduction
With more than three-quarters (77 percent) of American online daily
and a growing number of internet-connected devices in and around
the house, it comes as no surprise that cyberattacks on cities, corporations,
COURSE MODULE
The end goal? Protect personal information and make it safer for
users to send messages over public spaces without unwanted cyber threat.
But how exactly does cryptography accomplish this? Is cryptography just another
name for encryption? And what are some ways users can bulletproof their email
messages using encryption, leaving intrusive eavesdroppers frustrated and
COURSE MODULE
defeated?
But let’s get into the nitty-gritty details. Putting a magnifying glass up to the
hypothetical email message you just sent your boss, here’s how it got to your
boss’ inbox in one piece.
You type up your message and send it to the encryption program
along with your encryption key (remember, we need both encryption
and decryption programs for this to work). As mentioned, the normal,
readable message (or plaintext) you created transforms via
encryption to a jumble of unreadable characters (ciphertext) and is
sent over the internet to your boss.
Now on your boss’ end: She receives the ciphertext, which hopefully is
left untampered (no man-in-the-middle attack). In a perfect world,
COURSE MODULE
the ciphertext transforms via her decryption program and decrypting
key back into your original plaintext message, and the cryptography
process is complete.