Modern-day Cryptography IT & Computer Science Research Paper (Research Paper Sample)
Cryptography is an art as old as mankind. Over time it has been used as a secure means of communication that only those initiated into the group could understand. Some examples of cryptography were witnessed in Egyptian hieroglyphs and Julius Caesar's cipher system that was used to facilitate communication between Caesar and Cicero (Goyal & Kinger, 2013; Choubey & Hashmi, 2018). It is based on these uses that the concept of modern-day cryptography was developed. While the concept of cryptography has changed over the past few years, modern-day cryptography is strongly hinged on the ancient cryptographic mechanisms because it relies on transposition, substitution, and codes. This essay shall explore modern-day cryptography and its similarity to ancient cryptography. This paper will first explore the purpose that modern-day cryptography seeks to serve. The report will then outline the techniques used in modern-day cryptography and how can they be related to ancient cryptography.
Importance of Modern-Day Cryptography
When speaking about cryptography, the first thing that comes to mind is security and this is because, in the contemporary society, cryptography is the most commonly used tool to enhance the security of computer systems. However, Boutros (2020) avers that the use of cryptography is much greater than this because it serves four major purposes, which are the engagement of confidentiality, data integrity, authentication, as well as non-repudiation. Choubey and Hashmi (2018) support this supposition and highlight the first tenet as confidentiality and this is the most common use for cryptography as it ensures that information is kept fro
- Computer Science and Cybercrime IT & Computer Science Research PaperDescription: Cybercrimes have been a cause of concern because of the increased reliance on information technology. Cybercrime can be costly for the government because functions such as military, surveillance, and internal security can be affected by the theft of information or materials (Pomerleau, 2015)....3 pages/≈825 words| 6 Sources | APA | IT & Computer Science | Research Paper |
- The Internet and Digital Technology Control. Research PaperDescription: The pervasive growth of the internet and its digital components has provoked government, corporations, and media houses to act on the amount of content released to the public and the consequent effects it has on the status quo of the economy, social and political environments....1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Research Paper |
- LASA 2 Internal and External Security Planning IT Research PaperDescription: Network security is a very important element for the success of any business, small or large. For this reason, business managers need to create network security plans so as to ensure that their information resources are used in an effective manner. In this paper, I profile a network security ...7 pages/≈1925 words| 3 Sources | APA | IT & Computer Science | Research Paper |