Friday, May 31, 2019

A Closer Look At Cryptography Essay -- Writing Cryptography History Pa

A Closer Look At CryptographyEver since the earlier days of writing, people have had reasons to limit their information to a restricted group of people. Because of this, these people have had to develop ideas of making their information unable to be read by unwanted people. The general techniques used to hide the meaning of inwardnesss constitute the study known as cryptography. Ciphers, in general fall into deuce-ace major classifications 1. Concealment Cipher, 2. Transposition Cipher, and 3. Substitution Cipher (4). Cryptography protects information by altering its form, making it unreadable to unwanted people or groups of people.Cryptography, from the classic kryptos, meaning hidden, and graphei, meaning to write. The origins of secret writing can be traced back nearly four millennia to the hieroglyphic writing system of the Egyptians. References to cryptography are in like manner made in the bible.One of the oldest known examples is the Spartan scytale Plutarch tells how Laced aemonian generals exchanged messages by winding narrow ribbons of parchment spirally around a cylindrical staff. The message was then inscribed on the parchment. When the ribbon was unwound, the writing could be read only by the person who had a cylinder of exactly the same size, upon which to rewind it, so that the letters would reappear in their normal order (5).During the sixteenth, seventeenth and eighteenth centuries, interest in cryptography was very high. It was the custom in those days for key people, such as Mary of Stuart, the Charles I and II, and the Georges, to have private ciphers. During the eighteenth, nineteenth and twentieth centuries, cryptology played a major role in the military, especially in WWI and WWII, because the sec... ...rom the National Energy Supply to Fort Knox. This is a fairly similar situation to that of WWI and WWII, in that whoever has control of the other sides information, is in control of the war. I also think the challenge of trying to brea k someone elses codes, a game of sorts, is very interesting.Works Cited1. History of the Enigma. Russell Schwager. 18 Nov. 1998. < (12/8/99).2. The History of the German Enigma. Lech Maziakowski. 4 Dec. 1997. < (12/8/99).3. RSA (Rivest-Shamir-Adelman). Fred Hazan and Frank Rundatz.4 Dec. 1999. < http// (12/ 10/99).4. Gaines, Helen Fouche. Crytanalysis. New York Dover, 1956.5. Smith, Laurence Dwight. Cryptography. New York Dover, 1955.6. Peer proofreader Adam Fackler

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.