The basics of cryptography

5 28

Throughout history, mankind has tried to hide some information from the hidden eye. So it is not surprising that this desire, outside of a complete science - cryptography. What is it? Where is it used and for what purpose?

Today I discusse about Cryptography.....

General information

The method before cryptography is, as a rule, to serve the public interest. But as the internet became more widespread, it became a vast asset to humans. Cryptography is now used by hackers, fighters for information integrity and freedom of information and only individuals who want to encrypt their data and shine their net. But why is cryptography still needed? What is it and what can it give us? It is a science that communicates privacy.

History of development

It is assumed that the cryptography foundation was founded by Ini Tacticus. Efforts to encrypt data have not been made in ancient India and Mesopotamia. But they were not very successful. The first reliable system of protection was developed in ancient China. Extensive cryptography acquired in ancient times. It was then used for military purposes. Cryptographic technology found its way into the Middle Ages, but they have already adopted merchants and diplomats. This is called the golden age of science. The same binary encryption method has been proposed at similar to the computer technology used today. During World War I he was recognized as a full-fledged war tool. It was necessary to clarify the enemy post - and could get a stunning result. For example, German Ambassador Arturom Tsimmermanom intercepted a telegram sent by US intelligence. This resulted in the United States entering the war side by side. World War II was a kind of computer network mold development process. And this made cryptography a significant contribution. What is it and what are the practical results of its application? Some governments are therefore afraid of the possibility of suspending data encryption to put it into effect.

The collapse of the state monopoly

But the ban imposed by the government has been nullified, and in 1967 a book by David Kane's "Code Breaker" was published. It deals with the history of development, as well as the basics of cryptography and cryptanalysis. When it is published through the news, this book will appear for him and start doing other things. The situation improved like a landslide. At the same time there is a structure of modern methods of this science, and clearly will meet the basic requirements that encrypt information: integrity, confidentiality and neotslezhivaemost. Then the two elements are separated and are constantly part of the conversation: cryptanalysis and kriptosintez. People are looking for ways to bypass security and its uninterrupted potential in the first place. করার When engaging kriptosintezom, the goal is to ensure data security. And how things in modern times? Here, for example, can FSB cryptography be hacked? How? How fast?

Modernity

Cryptography seen on the Internet has reached a new level. Its methods are now widely used by individuals in identification, authentication and therefore e-commerce transactions. cryptocurrency, which is generated according to a certain mathematical algorithm, and not regulated by the state - and we can not specify how bitcoin. This way of paying is used illegally, or just won’t shine. As an example, you can have more details on concepts with Bitcoins. This system is recommended by a young programmer named Wei Dai. And in 2009, it successfully implemented Satoshi Nakamoto. Intermediaries in the form of banks or other financial institutions will not be required for the transaction, so they are very difficult to trace. Since complete network decentralization or Bitcoins is impossible to ice. Therefore, they can be used to pay for any of the products - if the seller agrees to accept the currency. The new money created could only be provided by the users themselves by providing the computing power to their computers.

Terminology

So, there is cryptography, what it is, we already know, the same with some of its terms let's understand to make it easier.

Our biggest interest is the electronic payment autonomous system. Thanks to him, buyers and sellers can communicate without problems. However, it is also a transaction cost that in that case it should have been mentioned to withdraw money to a bank account.

Reluctant to disclose the name - an idea that means we work privately with the participants in the transaction. It makes absolute and can be remembered. In the case of the latter still pays for the participation of an arbitrator. If he meets certain conditions, people will not be able to identify.

Honest party - the so-called person has all the necessary information and strictly follows the system protocol.

Drop-in Center - The referee who has the confidence of all participants. Respect for people is a guarantee of an agreed protocol.

Enemy - It is the criminals who want a break established by the encirclement confidential report. By default, such is understood by all participants in the system.

Stay anonymous

Let's look at a simple example of this. Privacy Gelators start with CGI Proxy (Web Proxy). They will not need to install individual software and clog the complex configuration of your head of hardware components. In this case the user merely conveys the information that he wants to go to a website. This user makes a request on their behalf, and then forwards the information to the person. But there are some pitfalls: Web proxies have a wonderful ability to copy all the information turned on by itself. To enjoy many of these opportunities safely.

Likes to use funds more seriously for more experienced users. An example might be yours. This service uses a multi-layer routing system, which includes a chain of proxy servers. Keep track of data because branching paths are difficult. Thanks to this it provides its users with a high level of data protection. Although it has its own manners.

CYPHERPUNK

This term is used in relationships with people, secret very passionate ideas. Such people are not enough proxy servers, and the quality of cryptography services is not satisfied with their operating system. Therefore, they try to expand the unpublished through the use of open cryptographic systems. For the most part they are the CYPHERPUNK movement of workers. It is noteworthy that these events often have an underlying political color. The reality is that the workers have been following pseudo-anarchism and many liberal social ideas.

Design

Mathematics and cryptography are closely related sciences, followed from the second to the first. Development of methods for decrypting data based on a wide range of encryption and algebraic methods. All the necessary steps can be performed by one person, but have created separate organizations for the entire state perimeter.

So, in our case, we can cite as an example the Cryptography Institute at the Federal Security Service. Encryption protocols developed by him are used for classifying access to sensitive data, which has been produced for millions of years. No sense in telling you now - I don't wanna ruin the suprise. Information technology has many similarities with this science. But in this case it means encryption of information in such a way that they were able to read a certain computer architecture. As you can see, science is closely related to modern life.

Conclusion

Cryptography is not an easy thing to do. Of course, you can create their own encryption system in your spare time, but not in fact it can throw a more or less strong resistance tough professional. If you want to understand the basics of cryptography, you can start with mathematical discipline. Although you can greatly simplify your work and use many open data encryption systems. But in this case it is necessary to raise the question of their effectiveness and level of protection

Thanks for Reading....

Sponsors of Kawser199
empty
empty
empty

@RogerVer @georgedonnelly

@MarcDeMesel @scottcbusiness @sanctuary.the-one-law @Omar please check my article & inspire me...

@TheRandomRewarder Thank you for Tips

7
$ 0.60
$ 0.60 from @TheRandomRewarder

Comments

How come did you think that cryptography is being used by hackers? 🤔

$ 0.00
3 years ago

Very nice & helpful article...

$ 0.00
3 years ago

like

$ 0.00
3 years ago

Very helpful information dear.

$ 0.00
3 years ago

Absolutely good information

$ 0.00
3 years ago