Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
A Look At Public Key Encryption - Term Papers

A Look At Public Key Encryption



Encryption is the process of disguising information by transforming
plain text into gibberish, or ciphertext, which cannot be understood by an
unauthorized person. Decryption is the process of transforming ciphertext
back into plaintext that can be read by anyone. Example of encryption can
be found in history, for example in the era of the Cold War, the Solviet
Union and the United States would send electronic messages to one military
point to another, encrypted. If the enemy intercepted the message, they
would have to crack this message to get the information. Typically when
governments used encryption they used a very complex method of encrypting
messages. Encryption does not have to be ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

key can easily switch the H back to a D, the V
back to an R, and figure out where to meet. Theses two examples are on
opposite sides of the spectrum, but both have their similarities and their
differences.
The major difference complexity, the government pays mathematicians to
research complex algorithms by which to encode the messages, like the
system used by Captain Video but these algorithms are complex enough that
if you tried to crack them it would take you decades with even the most
powerful computer today. This complex mathematical code is what makes the
text secure to anyone who tries to crack it. Some similarities we can find
in these two examples are their use of the key, the unlocking instructions,
to decode the message. They only used one key to encrypt and decrypt the
messages. This creates problems, security problems. The single key must
itself be kept very secret, while somehow still being transmitted to the
person receiving encoded messages. Even if the key is ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

A Look At Public Key Encryption. (2008, August 16). Retrieved April 27, 2024, from http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryption/88413
"A Look At Public Key Encryption." Essayworld.com. Essayworld.com, 16 Aug. 2008. Web. 27 Apr. 2024. <http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryption/88413>
"A Look At Public Key Encryption." Essayworld.com. August 16, 2008. Accessed April 27, 2024. http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryption/88413.
"A Look At Public Key Encryption." Essayworld.com. August 16, 2008. Accessed April 27, 2024. http://www.essayworld.com/essays/A-Look-At-Public-Key-Encryption/88413.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/16/2008 05:30:40 PM
Category: Computers
Type: Premium Paper
Words: 1212
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» A Look At Public Key Encryption
» A Look At Public Key Encryptio
» Privacy And The Internet
» Network Security
» Government Intervention Of The ...
» Security, Commerce And The Int
» Electronic Commerce
» Internet Firewalls
» Computer Ergonomics In The Work...
» The Computer And Mass Communica...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved