One of the evils that civilization has faced ever since the dawn of people is privacy. The issue of solitude on the Internet has raised many arguments for and against having it. The issue of privacy has gotten to the point where the government of the United States has placed a bill promoting single chip to encrypt all confidential cloth on the Internet. Why is solitude so important? Hiding secret material from intruder does not of necessity mean that what we keep secret it against the law. Since ancient times, people have trust courier to carry their messages. We seal out messages in a envelope when sending mail through the postal service. Using computer and encrypting programs to move electronic messages securely is not
different from distribution a letter the old-fashioned way. This document will examine the modern technique of encrypting messages and analyze why Phil Zimmerman created an extremely powerful civilian decipherable program, called the PGP, for "Pretty Good Privacy." In particular, by focusing on cryptography, which was at first intended for military use, this paper will examine just how easy it is to
conclude why giving civilians a military-grade encrypting program such as the-PGP may be unsafe to national security. Therefore, with any type of new technology, this paper will argue that the application of cryptography for civilian purposes is not just a right, but is also a necessity.Increasingly in today's era of computer technology, not only banks but also business and government agencies are rotating to encryption. processor security experts consider it best and most practical way to protect computer data from unauthorized disclosure when transmit and even when stored on a disk, tape,of the magnetic strip of a credit Two encryption system have led the way in the modern era. One is the single-key system, in which data is both encrypted and encrypted with the same key, a sequence of eight numbers, each between 0 and 127. The other is a 2-keysystem; in this approach to cryptography, a pair of mathematically complementary keys, each containing as many as 200 digits, are used for encryption and decryption. In contrast with ciphers of earlier generations, where superintended in part on concealing the algorithm, confidentiality of a computer encrypted message hinges solely on the secrecy of the keys. Each system is
thought to encrypt a message so inscrutably that the step-by-step mathematical algorithms can be made public without compromising security.
No comments:
Post a Comment