Friday, April 22, 2016

what is computer security

When the first electronic computers emerged from university and armed laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business,government and industry. But few laymen, even if they were conscious of the
machines, could see the link. Experts too, were skeptical. Not only were computers huge, expensive, one-of-a-kind devices designed for performing abstruse scientific and military calculations, such as cracking codes and calculation missile trajectories, they were also enormously difficult to handle.Now, it is clear that computers are not only here to wait, but they have profound effect on society as well. As John McCarthy, Professor of Computer Science at Stanford University speculated in 1966: "The computer gives signs of becoming the contemporary counterpart of the steam engine that brought on the industrial revolution - one that is still gathering momentum and whose true nature had yet to be seen."Today's applications of computers are vast. They are used to run normal household appliances such as televisions and microwaves, to being tools in the workplaces through word processing, spreadsheets, and graphics software, to running monumental tasks such as being the heart and soul of the nation’s tax dispensation department, and managing the project timetables of the room Shuttle.It is obvious that the computer is now and forever will be inexorably linked tour lives, and we have no choice but to accept this technology and learn how to harness its total possible. With any progressing technology, an unauthorized application can almost be found for it. A computer could and has been used for theft and fraud - for
example, as a database and manager of illegal activities such as drug trafficking and pornography. However, we must not just think the harmful applications of the computer, but also take into account the good that they have caused. When society embraced the computer technology, we have to treat this as an extension of what we already have at hand. This means that some problems that we had before the computer era may also arise now, in the form where computersare an accessory to a crime.

Why it is?


One of the evils that civilization has faced ever since the dawn of people is privacy. The issue of solitude on the Internet has raised many arguments for and against having it. The issue of privacy has gotten to the point where the government of the United States has placed a bill promoting single chip to encrypt all confidential cloth on the Internet. Why is solitude so important? Hiding secret material from intruder does not of necessity mean that what we keep secret it against the law. Since ancient times, people have trust courier to carry their messages. We seal out messages in a envelope when sending mail through the postal service. Using computer and encrypting programs to move electronic messages securely is not
different from distribution a letter the old-fashioned way. This document will examine the modern technique of encrypting messages and analyze why Phil Zimmerman created an extremely powerful civilian decipherable program, called the PGP, for "Pretty Good Privacy." In particular, by focusing on cryptography, which was at first intended for military use, this paper will examine just how easy it is to
conclude why giving civilians a military-grade encrypting program such as the-PGP may be unsafe to national security. Therefore, with any type of new technology, this paper will argue that the application of cryptography for civilian purposes is not just a right, but is also a necessity.Increasingly in today's era of computer technology, not only banks but also business and government agencies are rotating to encryption. processor security experts consider it best and most practical way to protect computer data from unauthorized disclosure when transmit and even when stored on a disk, tape,of the magnetic strip of a credit Two encryption system have led the way in the modern era. One is the single-key system, in which data is both encrypted and encrypted with the same key, a sequence of eight numbers, each between 0 and 127. The other is a 2-keysystem; in this approach to cryptography, a pair of mathematically complementary keys, each containing as many as 200 digits, are used for encryption and decryption. In contrast with ciphers of earlier generations, where superintended in part on concealing the algorithm, confidentiality of a computer encrypted message hinges solely on the secrecy of the keys. Each system is
thought to encrypt a message so inscrutably that the step-by-step mathematical algorithms can be made public without compromising security.

Designed key

The single key scheme, named the Data Encryption Standard - DES for short -was designed in 1977 as the official method for defensive unclassified computer data in agencies of the American Federal government. Its evolution began in1973 when the US National Bureau of Standards, responding to public concern about the privacy of computerized information outside military and diplomatic channels, invited the submission of data-encryption techniques as the first step towards an encryption scheme intended for public use.
The method selected by the bureau as the DES was developed by IBM researchers. During encryption, the DES algorithm divides a message into blocks of eight fonts, and then enciphers them one after another. Under control of the key, the letters and numbers of each block are scrambled no fewer than 16times, resulting in eight characters of cipher text. As good as the DES is, obsolescence will almost certainly overtake it. The life span of encryption systems tends to be short; the older and more widely used a cipher is, the higher the potential payoff if it is cracked, and the greater the likelihood that someone has succeeded. An entirely different approach to encryption, called the 2-key or public-key system, simplifies the problem of key distribution and organization. The approach to cryptography eliminates the need for subscribers to share keys that must be kept confidential. In a public-key system, each subscriber has a pair
of keys. One of them is the so-called public key, which is freely available to anyone who wishes to communicate with its owner. The other is a secret key,known only to its owner. Though either key can be used to encipher or to decipher data encrypted with its mate, in most instances, the public key is
employed for encoding, and the private key for decoding. Thus, anyone can sends secret message to anyone else by using the addressee's public key to encrypt its contents. But only the recipient of the message can make intelligence of it, since only that person has the private key.A public key cryptosystem is called the PGP, for Pretty Good Privacy.Designed by Phil Zimmerman, this program is freely distributed for the purposeof giving the public the knowledge that whatever communications they pass, they
can be sure that it is practically unbreakable.

About technique

PGP generates a community and confidential key for the user using the RSA method.The data is then encrypted and encrypted with the IDEA algorithm - which dissimilar to the DES, but the work factor to decode the encrypted message by brute force is much higher than what the DES could provide. The reason why the RSA issued only when generate the keys is that the RSA takes a very long time to encrypt an entire document, where using the RSA on the keys takes a me refraction of the time. At this time, Zimmerman is bang charged by the US government for his effort in developing the PGP. The administration considers encryption as a weapon, and they have documented regulations scheming or prohibiting the export of
munitions. Since the PGP is a powerful encryption program, it is considered and can be used as a powerful weapon and may be a threat to national security.On the Internet, it is clear that many people all over the world are against the US government's effort on limiting the PGP's encryption capabilities,and their reason is that the ban infringes on the people's right to privacy.The PGP must not be treated only as a weapon, for it contains analogies that are not used in wartime. One of them is authentication. The two-key cryptosystem is designed with authentication in mind: Using someone's public key-to encrypt enables only the owner of the private key to decry pt the same message.In the real world, we use our own signature to prove out identity in signing cherubs or contracts. There exists a retina scanner that checks the blood vessels
in our eyes, as well as fingerprint analysis devices. These use our physical characteristics to prove our identity. A digital signature generated by public key cryptosystem is much harder to counterfeit because of the mathematics of factoring - which is an advantage over conventional methods of tests for our identity.

Computer privacy

Another analogy the PGP has with the real world is the need for safety.Banks and corporations employ a trusted courier - in the form of an armored truck or a guard - to transfer sensitive documents or valuables. However, thesis expensive for civilian purposes, and the PGP provides the same or better safety when securing civilian in order. While many argue that limiting the PGP's abilities are against the people’s right to privacy, the PGP must also be seen as a necessity as we enter the Information Age. There is at present little or no practical and reasonably priced way to secure digital information for civilians and the PGP is an answer to this problem. Computer privacy must not be treated differently than any other method to make private any papers. Rather, we must consider the computer as a tool and use it as an extension of society's development.Clearly the techniques we employ for computer privacy such as encryption, secure transfers and authentication closely mirrors past efforts at privacy and non-criminal efforts. The government is putting more pressure against the distribution of PGP outside of the United States. One of their main reasons whatshisname it is freely distributed and thus can be modified in such a way that even the nonrepresentational of the US government cannot break the PGP's secured message. The government could now reason that the PGP can provide criminal organizations a means of secure communications and storage of their activities,and thus make the law enforcement's job much harder in tracking criminals down and proving them guilty.Also, we must never not remember one of our basic human rights - one that many laid their lives for, is freedom. We have the freedom to do anything we wish that is within the law. The government is now attempting to pass a bill promoting a single algorithm to encrypt and decry pt all data that belongs to its citizens. A multitude of people around the world are opposed to this concept,arguing that it is against their freedom and their privacy.