Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Cryptography - School Essays

Cryptography


I knew very little about when I began this assignment. What I did know came from my dealings with it in my hobbies. I knew it was a way to secure information that the information is not seen by the wrong eyes. By encoding information, society can take part in things such as electronic financial transactions, Online Purchasing, and electronic communication. I knew Many Operating systems used encryption such as M-4, R.S.A., and Triple D.E.S. to keep passwords and user informa� tion secure on the machine. I also knew that the most widely used was Data Encryption Standard or D.E.S. and it had just been cracked the summer be� fore by a man who built the 200,000 dollar machine it took to crack ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

and tries hard to figure out how they work. A Cracker has malicious intent, a hacker may or may not intend to commit an act of fraud. It is possible to be a hacker and a cracker at the same time. Crackers like to break into systems for the pure joy of destroying. Some hackers have decided to help system administrators either make their system more secure or catch a person who has committed a computer crime. This is where I fit in I anonymously help others find security leaks and help them seal them.I look for bugs in software that must be fixed, test different methods of cracking codes or just give pointers on how to keep the people that use the system from revealing how to access the system. So naturally I chose , not only because of my interests but because it presented me with a way to learn about .
First I learned about in the past. The Romans were the first to substitute a letter for a letter in a normal progression in what is called the Julius Caesar Method. In World War II a ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Cryptography. (2008, August 26). Retrieved November 28, 2024, from http://www.essayworld.com/essays/Cryptography/88917
"Cryptography." Essayworld.com. Essayworld.com, 26 Aug. 2008. Web. 28 Nov. 2024. <http://www.essayworld.com/essays/Cryptography/88917>
"Cryptography." Essayworld.com. August 26, 2008. Accessed November 28, 2024. http://www.essayworld.com/essays/Cryptography/88917.
"Cryptography." Essayworld.com. August 26, 2008. Accessed November 28, 2024. http://www.essayworld.com/essays/Cryptography/88917.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/26/2008 10:40:28 AM
Category: Computers
Type: Premium Paper
Words: 1227
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Cryptography
Cryptographys Importance In Go
PRIVACY
A Look At Public Key Encryption
A Look At Public Key Encryptio
A Look At Public Key Encryption
The Necessity Of Computer Secur...
Law, Policy And Technological D...
Government Intervention Of The ...
Internet Firewalls
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved