-
Essay / Encryption - The Art of Hidden Messages - 2195
IntroductionEncryption - The Art of Hidden MessagesEncryption is used in cryptography for algorithmic purposes. Algorithms include encryption and decryption which comprise a series of well-defined steps which can be followed as a procedure. But sometimes we get the word cipher in non-technical usage which means a code. But it was distinct from codes when it came to classical cryptography. To clarify this information, they were used to make the substitution based on a large codebook that linked characters or numbers to a word or phrase. For example, the code UQJHSE could have the same meaning as the phrase "Proceed to the following coordinates." But when it came to encryption, UQJHSE could refer to plaintext or any other information that a sender would like to transmit to a recipient (Gershaw, 1989). It was according to the encryption, whereas as for the encrypted form it was called the ciphertext which contained all the information regarding the plaintext but was mainly unreadable to human or any computer without any mechanism to decipher it. In any encryption operation, there must be a key which always constitutes auxiliary information. On the other hand, it can also be referred to as a cryptographic variable. The encryption procedure depends on the key used to modify the details of how the algorithm works. It would be very difficult to decrypt the ciphertext resulting in readable plaintext if a person does not have any information regarding the key. In most modern cases they can be classified in two ways. The first concerns block ciphers and stream ciphers. Block cipher means working on blocks of symbols which are usually of fixed size while stream cipher means in the middle of the paper......at each other's location. The device used for computational purposes and directly using the phenomena of quantum mechanics, including entanglement and superposition, to perform operations on data is known as a quantum computer. They are different from traditional computers based on transistors. Quantum properties are useful in such a way that they can be used to perform operations and represent data about those data (Mayer, 1984). Works Cited Gershaw, D. (1989). The history of encrypted messages. California: University Press. Levenson, H. (1973). Historical figures, composed of pen and paper. Journal of Technology, 41, 397-404. Lynch, S. (2002). Computers and early technologies. New York. Press in the information age. Mayer, R. (1984). Current applications of encryption. Pearson Education, Inc.