Introduction
Cryptography is a science and an art that is the process of converting ordinary information to unintelligible talking. It guarantees security services and integrity in all communications and data exchange in the modern information society. It is the study of encryption but from a mathematical perspective. It allows secret communication around the world to enable people to read the encrypted message if anyone is listening, but the person would know the actual message. Only the intended receiver of the message can read it. Cryptography is used in areas that require security and limits only sanctioned people have access to the secret data. It is essential when sending messages since they make sure only the customers who have paid can install the software. It is responsible for preventing potential hackers from jailbreaking in people's electronics. (Stalling, 2006).
Cryptography ensures the security of websites and secure transmissions are possible. To make sure that a web site is safe; all the data to be transmitted in computers where data is stored should be encrypted. Because of the vast number of commercial transmission on the internet, cryptography is very crucial in making sure there is maximum security in the transactions. It is also used to regulate access in satellites and the cable televisions. If it were not for cryptography, hackers would be accessing any person E-mail and listening to our mobile conversations. It would also be easy for them to tap into the company cables, break into bank storage accounts or even have free cable service.
Today, there is a cryptographic technique known as Time stamping that can certify if an electronic document or a particular communication was delivered at the correct time. The technique uses an encryption model known as the blind signature scheme. The sender allows the sender to acquire a message sent by another person revealing all the information of the other party. The technique is almost the same to sending a mail through the U.S mail but issues an extra level of proof. It provides evidence that a receiver received a particular document. The application helps in making the transition of legal electronic document possible. (Stinson, 2006).
Through Cryptography, there is the use of Electronic Money in everyday life. Transactions are done electronically using a net transfer of funds from one place to the other that can be either a credit or a debit. Cryptography is used in electronic money applications to secure transactions data like the account numbers, use of digital signs has replaced the analog signature that used to be handwritten, and the Public- Key encryption can provide privacy and confidentiality.
Generally, cryptography is used in everyday life as a means of keeping and exchanging secret information. Before passing any message, whether it is encrypted or not, people always want to verify its integrity, and it is made easy by the cryptography aspect. The issue of non-repudiation is an essential feature of the Cryptography systems. Cryptography helps dark networks, mostly the free net not to be able to censor information. Each user can store information on their personal computers; therefore, taking a single person down is not able to remove information from the network. In case one has an illegal content in the computer without knowing it, due to cryptography, if the message is encrypted, one cannot be judged since it is impossible to prove that it is your computer that is holding the illegal content.
How Encryption is Used to Enhance Database and Online Service Security
Encryption is the strategy where data is changed from a readable manner to an encoding mode that may only be decoded by a different party only if they can access the decryption key. It is among the essential ways of ensuring data security mostly for the end- to -end data protection that is transmitted in different networks. An essential strategy to enhance data security is tokenization and security. When one has a suitable data encryption solution, their data can be translated into a secret code, which makes the data more secure. Only those who have the appropriate password will be able to read the encrypted information. The methods to be used, either the asymmetric encryption or the symmetric encryption depends on the persons need. Data confidentiality is an essential issue in the organizations since there is increased use of computers, internet and various networks in the transmission of data. Organizations have to move from old methods of data encryption to the new methods use algorithms for data protection.
A suitable data encryption security that can ensure online service security has e-mail applications, digital machines, and the present data. Due to the increased use of removable media, external drives and cloud storage by workers in an organization, Data security is becoming a challenge. For the organization to deal with these problems, they have to protect their data using auto- encryption. This helps the people who are not authorized not be able to decrypt any data even if it is copied.
Tokenization is a reliable, popular and modern method of ensuring online data security. The method is the most reliable and does not fail since the sensitive data is replaced with exclusive symbols that do not change nor damage the data. It helps to reduce the volume of data in the organizations which use the strategy. The data encryption security solution is continuing to increase its popularity in organizations that can handle credit card information.
Encryption is an essential aspect in most of the product and services in the consumer and commercial realm to secure data when it is stored or when still in transit, by use of either a smartphone, flash drive or a hard drive. Devices like SIM cards, smart cards or modems use encryption to encrypt data that is sensitive. It is used to secure data in transit that is transferred from all gadgets in all networks, not only the internet. When one uses an ATM or purchases an item online using a smartphone, encryption is used to secure all the information that is relayed. Digital systems that prevent the reproduction of copyright products are also an example of how encryption is used to enhance online service security. IPhones are also used to secure the available data in case they are stolen or lost.
Organization should be able to identify the kind of encryption they need to secure their data and enhance its online service security. Microsoft encryption is mostly used since it is more strong since its users don't have to seek or other traditional methods of protecting their sensitive data especially financial data or any other sensitive file. Many computer users save their work regularly to avoid loss of data due to power outage or any other unexpected issue. Deleting the temp does not guarantee that the data is encrypted and therefore one has to make sure it is encrypted in either way. (Needham, 1998).
References
Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering, 4(5), 877.
Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993-999.
Stallings, W. (2006). Cryptography and network security, 4/E. Pearson Education India.
Stinson, D. R. (2005). Cryptography: theory and practice. Chapman and Hall/CRC.
Cite this page
Essay Sample on Cryptography and Encryption. (2023, Jan 03). Retrieved from https://midtermguru.com/essays/essay-sample-on-cryptography-and-encryption
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Paper Sample: Intuition in Maths and the Role That It Plays in This Field
- Essay on 21st Century Issues Based on Films: The Matrix, Hairspray, Shawshank Redemption
- Comparative Essay on Magnificent and Cold Blood Films
- Art Essay Sample on A Burial at Ornans by Gustave Courbet
- Song Analysis Essay on "I Know" by Jay-Z
- Paper Example on Security Goals: Response to Threats and Safeguards That All Companies Need
- C vs JavaScript: Thread Control & Multi-Tasking - Research Paper