| ||||||
|
Billions of people worldwide send trillions of messages through the World Wide Web each day. A large percentage of those people are, on any given day, conducting sensitive transactions such as online banking, shopping, and bill payment. And they need those transactions to be secure. You are probably one of those people. On any given day, businesses are sending and receiving enormous volumes of sensitive information, such as financial data, trade secrets, customer data, and marketing plans. A loss of this information to the wrong party can destroy a business. You probably work for one of those businesses. Protecting personal and business information online is where cryptography (from Latin, meaning "science of hidden writing") comes in. Cryptography makes it possible for a Website to provide password protection, credit card encryption, secure log-ins, and other security measures we rely on. It allows businesses to safely send, receive, process, and store proprietary information.
When used with other security techniques, cryptography is a pillar of a sound security structure. We'll look at why that is, shortly. First, a brief history of cryptography.... A brief history of cryptographySome scholars believe that cryptography emerged not long after writing was invented. Archeologists have found samples of original cryptographic writing from as far back as 1900 B.C., when a scribe in Egypt used abnormal hieroglyphs in a document. Early uses included the protection of diplomatic memoranda and military plans. See? We told you it was brief. And it helps us see that cryptography has, for a long time, protected vital information by preventing "the bad guys" from understanding it. Cryptography played an important role thousands of years ago for a reason that is still true today: preventing interception isn't always possible. Someone is, sooner or later, going to get your information. The solution is to make the information unreadable to any unauthorized person. The "bad guys" might get their grubby little hands on an encrypted message, but they'd have no idea what it said. You may be thinking, "That's exactly what we need for Internet-based communications." If so, you are quite right. And modern security experts agree with you. Cryptography todayRemember, we said preventing interception isn't always possible. Actually, it's a given. The media for transmitting information are not, in themselves, secure. Cryptography is an essential part of protecting information. Many industries, such as banking, manufacturing, retail, and telecommunications, rely on cryptography. So do government sectors such as law enforcement and the military. Four distinct security elements help protect information:
Three goals, three methodsThe three main goals of any good cryptographic scheme are to:
The three variations of cryptographic systems typically used to achieve these objectives are:
In each instance, the data originate as plaintext. The plaintext is then is then encrypted to ciphertext. The ciphertext is almost always decrypted into functional plaintext, which usually reappears in its original form. Name triviaPeople who work in the field of cryptography have names for specific parties in an encrypted communication situation. The two parties in communication with one another are referred to as Alice and Bob. In where there is a third or a fourth party included in the dialog, they are known as Carol and Dave, respectively. Outside factors must also be accounted for. So, a malicious party is called Mallory, an eavesdropper is Eve, and Trent is the name for a loyal third party. Famous secretsCryptography is especially intriguing, due to all the secrecy involved. This lends the entire discipline a certain mystique. Ironically, the mystique isn't what makes a cryptographic algorithm successful. In fact, the most successful algorithms are well-known. The most successful ones are successful not because of secrecy, but because experts have devoted extensive resources to enhancing them. If a cryptographic scheme has been in use for any length of time, that's probably because it has a high success rate. Erik Braunitzer is a Web Development Manager working with CXtec, http://www.cxtec.com/. Formerly a small time Web programmer, Erik now manages a team of highly skilled content developers with masters in communications and writing. CXtec has been helping companies meet their networking goals since 1978, without blowing their budgets. CXtec provides sales and service for network gear, Voice over IP, network cables, network accessories, and legacy hardware. |
Some cryptography resources:
|
|