cryptography small details
#1

cryptography small details

[attachment=16268]

Introduction
Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore less than useful for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.


Traditional Cryptography

Privacy is paramount when communicating sensitive information, and humans have invented some unusual ways to encode their conversations. In World War II, for example, the Nazis created a bulky machine called the Enigma that resembles a typewriter on steroids. This machine created one of the most difficult ciphers (encoded messages) of the pre-computer age.
Even after Polish resistance fighters made knockoffs of the machines -- complete with instructions on how the Enigma worked -- decoding messages was still a constant struggle for the Allies [source: Cambridge University]. As the codes were deciphered, however, the secrets yielded by the Enigma machine were so helpful that many historians have credited the code breaking as an important factor in the Allies' victory in the war.



Limitations of Traditional Cryptography

Both the secret-key and public-key methods of cryptology have unique flaws. Oddly enough, quantum physics can be used to either solve or expand these flaws.

The keys used to encode messages are so long that it would take a trillion years to crack one using conventional computers.


Uncertainity

Unlike in classical physics, the act of measurement is an integral part of quantum
mechanics. So it is possible to encode information into quantum properties of a photon in
such a way that any effort to monitor them disturbs them in some detectable way. The
effect arises because in quantum theory, certain pairs of physical properties are
complementary in the sense that measuring one property necessarily disturbs the other.
This statement is known as the Heisenberg uncertainty principle. The two complementary
properties that are often used in quantum cryptography are two types of photons
Polarization, e.g. rectilinear (vertical and horizontal) and diagonal (at 45° and 135°).


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Radio frequency based real time Child Monitoring and alarm system simple details seminar addict 1 2,024 06-09-2014, 06:45 PM
Last Post: Guest
  TELE IMMERSION small details seminar addict 1 1,618 20-12-2012, 11:21 AM
Last Post: seminar details
  Small Fractal Antennas project uploader 1 1,554 20-11-2012, 01:16 PM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 1,980 14-11-2012, 12:29 PM
Last Post: seminar details
  Payroll Management System small details seminar addict 1 3,233 06-11-2012, 05:28 PM
Last Post: seminar details
  Pick and Place Robot small details seminar paper 1 1,116 01-11-2012, 12:45 PM
Last Post: seminar details
  Development of a Prison management system details seminar details 1 1,387 27-10-2012, 01:51 PM
Last Post: seminar details
  RFID based library management system DETAILS seminar paper 1 2,718 20-10-2012, 12:27 PM
Last Post: seminar details
  CLAP SWITCH details seminar paper 1 2,671 20-10-2012, 12:05 PM
Last Post: seminar details
  Residential Piezoelectric Energy Sources details seminar addict 2 1,563 09-06-2012, 05:05 PM
Last Post: seminar details

Forum Jump: