Wednesday, April 24, 2019

Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 words

Cryptography Application Methods - Research Paper frameworkThis led to the emersion of debit and credit cards whose screenings have since generate widespread. This age of information has witnessed the emergence of cryptography a major protection method of applications. This paper will investigate some of the application methods of cryptography together with the systems application in a college university. In a university setup, cryptography has applications in ensuring covert in storage, integrity in transmission, authentication of identity and integrity in storage.The maintenance of the secrecy in storage requires a one cardinal system whereby the user is responsible for the provision of the computer key at the start of the session. After this, the computer takes care of the decryption and encryption during the entire course of its commonplace use. Indeed, there are numerous hardware devices for automatic encryption of personal computers of all the information that the magn etic disk stores. Upon turning on a computer, a user must provide the encryption hardware with a key. Otherwise, the information will be meaningless even in the event that the hard disk is stolen. However, secrecy in storage is not without problems. In an event that the user forgets the key, then the encryption information become unusable. Apparently, encryption only occurs while the information is in storage and not when it is in use.The electronic coin transfer has the danger of invasion by criminals who can tap a system and make assumed transfers. However, to realize integrity in the transfer of funds, there is need to perform an information checksum before submitting it in the form of encryption. Upon the receipt of this encrypted information, another checksum takes place for comparison after decryption. An agreement of the checksum is an indication that an alteration had occurred to the message. beat this kind of information is easy. Since a lot of publications and intellect ual works occur in universities, integrity in the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.