Wednesday, February 27, 2013

Cryptography.

Cryptography.
(or cryptology; from Greek ???????, kryptos, hidden, secret; and ???????, gráphin, writing, or -?????, -logia, record, respectively)[1] is the practice and study of hiding information. Modern cryptograph intersects the disciplines of mathematics, computing device science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

Cryptology prior to the modern age was near synonymous with encryption, the conversion of information from a readable state to likely nonsense. The sender retained the ability to decrypt the information and thence avoid unwanted persons being able to read it. Since WWI and the orgasm of the computer, the methods used to carry out cryptology have pop off increasingly complex and its application more widespread.

Modern cryptography follows a strongly scientific approach, and designs cryptographic algorithms around computational hardness assumptions, making such algorithms hard to break by an adversary. Such systems are not unbreakable in surmise but it is infeasible to do so by some(prenominal) practical means. These schemes are therefore computationally secure.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

There experience information-theoretically secure schemes that provably cannot be broken--an example is the one-time pad--but these schemes are more difficult to implement than the theoretically breakable but computationally secure mechanisms.

Cryptology-related technology has raised a number of well-grounded issues, some of which remain unresolved.
Terminology

Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (called plaintext) into unintelligible gibberish (called ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext venture to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both...If you want to masturbate a full essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment