ENCRYPTON APPLICATION

  • Dadenova Gulxan Kenesbaevna Tashkent University of Informational Technologies
Keywords: encryption, decipherment, message, information security

Abstract

The word encryption comes from the Greek word kryptos, meaning hidden or secret.
The use of encryption is nearly as old as the art of communication itself. As early as 1900 BC, an Egyptian scribe used non-standard hieroglyphs to hide the meaning of an inscription. In a time when most people couldn't read, simply writing a message was often enough, but encryption schemes soon developed to convert messages into unreadable groups of figures to protect the message's secrecy while it was carried from one place to another. The contents of a message were reordered (transposition) or replaced (substitution) with other characters, symbols, numbers or pictures in order to conceal its meaning.
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher text that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-rand omen cryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

References

Cracking the Coding Interview, 6th Edition: 189 Programming Questions and Solutions, Gayle Laakmann McDowell 2015

CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide, Darri Gibson 2014

Views:

58

Downloads:

45

Published
2016-02-28
Citations
How to Cite
Dadenova Gulxan Kenesbaevna. (2016). ENCRYPTON APPLICATION. World Science, 1(2(6), 84-86. Retrieved from https://rsglobal.pl/index.php/ws/article/view/854
Section
Computer Science