Sign In
Not register? Register Now!
You are here: HomeTerm PaperIT & Computer Science
Pages:
3 pages/≈825 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Term Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Cryptography IT & Computer Science Term Paper Essay (Term Paper Sample)

Instructions:

Evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page

source..
Content:


The History of Cryptography from its Origins
Author Name
Institutional Affiliation
Course Number and Name
Instructor Name
Assignment due Date
The History of Cryptography from its Origins
Introduction
A technique that allows the protection of communications and information through codes to ensure that the intended person uses every data is known as cryptography. Cryptology is the process of protecting communications and information through coding in various computer systems. The primary objective of Cryptography is to secure communication from access by the third party. According to various studies on Cryptography's origin, the first evidence of this coding was found in 1900 BC in an inscription carved in Egypt (Gençoğlu, 2019). From then, the evidence has been witnessed in various nations through major early civilizations on Cryptography. The military majorly used cryptography to protect and hide its secret information up to the 2nd World War. However, the commercial sector was attracted by the information protection post-war hence businesses have been using Cryptography to secure their data from competitors. Through various evolutions in information technology, non-repudiation, data origin authentication, entity authentication, and data integrity are current Cryptography applications (Sherman et al., 2019). Claude Shannon's invention, public-key, and hashing are the primary ways Cryptography was used in history, which has improved over time.
Claude Shannon's Invention

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Social Implications of The Business of Piracy On Android Application
    Description: Piracy has always been the bane of any digital industry and in the age where people are engrossed on smartphones, it is inevitable that shadow of software piracy is there. According to Lending and Slaughter (1999), “Intellectual property is often the most valuable corporate asset in an increasingly...
    7 pages/≈1925 words| 20 Sources | APA | IT & Computer Science | Term Paper |
  • IT Systems Recommendation: Amazon
    Description: Amazon Incorporation is a multinational technology company with its headquarters in Seattle. The company focuses on cloud computing, e-commerce, digital streaming, and artificial intelligence. Amazon is considered as one of the Big Five tech businesses in the United States alongside Facebook, Google, and ...
    1 page/≈275 words| 5 Sources | APA | IT & Computer Science | Term Paper |
  • IT System Recommendation It & Computer
    Description: Amazon Incorporation is a multinational technology company with its headquarters in Seattle. The company focuses on cloud computing, e-commerce, digital streaming, and artificial intelligence. Amazon is considered as one of the Big Five tech businesses in the United States alongside Facebook, Google, and ...
    1 page/≈275 words| 5 Sources | APA | IT & Computer Science | Term Paper |
Need a Custom Essay Written?
First time 15% Discount!