Writing tips and writing guidelines for students,case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Friday, 22 March 2019
Computer Cryptography :: Exploratory Essays
Computer codingWhen I eldest read the term electronic ready reckoner cryptography, I thought that it was a proficient term for hacking. After looking up cryptography on an online dictionary, I was sure I wasnt far from the truth. But afterwards further examining the topic, I find I am only part right. Computer cryptography is a very complex thing. According to David Banisar 1, Cryptography provides a means of accomplishing two crucial functions- encoding and authentication.In order to visualise cryptography, I think it is best to first look at encryption and authentication. Then I will examine how it affects the privacy of personal computer intentionrs and how the government is attempting to deal with the cryptography issue. I will also rail a brief look at quantum computers and their effect on the computer society.Encryption is a security process, intentional to secure information creation sent electronically. Its kind of like sending a kernel military-style. Instead of saying, The president has left the White House, a military formal might say something like, The eagle has left the nest. The difference between the lawsuit above and encryption is that encryption has more to do with mathematics, since computers communicate apply acts, not letters.Authentication is just as it sounds. Authenticity means, Not foolish or imitation. 2 I also found that authenticate means, to prove or serve to prove the authenticity of. 3 Basically, its making something legitimate. Well, authenticating a computer document is the same as signing the document. The sender uses a ludicrous digital signature to let the receiver deal that the document is ex officio and sent from the right person.So, to sum it up, computer cryptography software is designed to send and receive important hearts using a type of inexplicable code to send the message and an electronic signature to let you know the receivers software allowing him to easily read the message i s real. The message is then decoded by message.When personal computer users purchase something online, they use a credit card number or bank account number to make their purchase. This number is sent through the website to the company youre obtain with. If there are any bugs in the sites programming, otherwise users can get a hold of your account information and use it to do the same, to purchase things online, where no one is there to verify that that is you (Stephen Budianski, Losing the enter War, Atlantic Monthly, 2002).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment