Tuesday, June 11, 2019
Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 words
Cryptography Application Methods - Research Paper ExampleThis led to the increase of debit and credit cards whose applications have since become widespread. This age of information has witnessed the emergence of cryptography a major protection method of applications. This paper leave alone investigate some of the application methods of cryptography together with the systems application in a college university. In a university setup, cryptography has applications in ensuring secrecy in terminal, righteousness in transmission, authentication of identity and integrity in storage.The maintenance of the secrecy in storage requires a one key system whereby the user is obligated for the provision of the computer key at the start of the session. After this, the computer takes c be of the decryption and encryption during the entire course of its normal use. Indeed, there are numerous hardware devices for automatic encryption of personal computers of all the information that the disk stor es. Upon turning on a computer, a user must rear the encryption hardware with a key. Otherwise, the information will be meaningless even in the event that the hard disk is stolen. However, secrecy in storage is not without problems. In an event that the user forgets the key, then the encryption information become unusable. Apparently, encryption only occurs while the information is in storage and not when it is in use.The electronic money transfer has the danger of invasion by criminals who can tap a system and make false transfers. However, to realize integrity in the transfer of funds, there is need to perform an information checksum before submitting it in the form of encryption. Upon the receipt of this encrypted information, another checksum takes place for comparison after decryption. An engagement of the checksum is an indication that an alteration had occurred to the message. Forging this kind of information is easy. Since a lot of publications and intellectual works occur in universities, integrity in the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment