Professional Documents
Culture Documents
These combined features protect the infrastructure devices as well as the end devices within the local network. But how is network traffic protected when traversing the public Internet? The answer is through cryptographic methods. Secure communications involves a few primary tasks: Authentication - Guarantees that the message is not a forgery and does actually come from who it states it comes from. Integrity - Similar to a checksum function in a frame, guarantees that no one intercepted the message and altered it. Confidentiality - Guarantees that if the message is captured, it cannot be deciphered.
All of this probably still sounds very difficult to understand. This is why it takes so much education if you want to work as a cryptographer. There are only some people who can truly understand all of this and thus use it to help all of the rest of us with our daily computer needs. Of course, it is also why the people who work in this field make such good money doing so. Why do you need cryptosystems, Government, private companies and universities exchange data over Internet with their trusted partners? They want full secure data exchange; no hacker or third party should be able to intercept the important data. To over come privacy, secrecy and importance of data being hacked or stolen, cryptography provides two kinds of cryptosystems. First is "Symmetric" system under, which cryptosystems use the same secret key to encrypt or decrypt a message received data packet from trusted partners. The other cryptosystem is asymmetric system under, which two different keys are used to encrypt and decrypt the message or received data packet. On public key is used to encrypt the data or message and the private key on receiving end is used to decrypt the message or data packet. Now the question is how do we send these keys to trusted partners. Other than latest tools used in monitoring, securing data exchange, keys are passed through trusted couriers to avoid data being intercepted by hackers. Encryption - "is a process of changing or converting normal text or data information into gibberish text". Decryption - "is a process of changing or converting gibberish text back to correct message or data by using encryption method". http://www.spywareantivirus.info Article Source: http://EzineArticles.com/?expert=Sanjay_Kak
Cryptography provides algorithms to keep the message secure while transmitted on Internet. Read more: http://wiki.answers.com/Q/What_are_the_advantages_of_using_cryptography#ixzz1c9bspG4Y
Fairness Accountability Untraceability Dividability Transferability Off-line operations Universality Data distribution operation (TV, CD-ROM) Selective reception Secrecy in Transmission Secrecy in Storage Integrity in Storage Authentication of Identity
Which protocols they are using/supporting? What are some of their applications?
Secure messaging/mail Secure network communications Network authentication Electronic voting Electronic notary Digital money (digital wallet) or Electronic Cashcards (credit cards, ATM/debit cards) Data distribution Credentialing Systems Electronic Signatures Systems Using Changing Keys Covert communication using Steganogrphy Security mechanisms for secure ID cards, smartcards, biometrics
**( http://electronicsbus.com/cryptography-encryption-algorithms-decryptionnetwork-data-security/)
What is their current status (are they improving or retiring)? What future do you foresee for this technology?