Write reply to post related to cryptography

Assignment Help Computer Engineering
Reference no: EM131920343

You need to write reply with 2 APA format references.

Cryptography, as stated in the forum description, has been around since ancient times when the written form of communication was used. Civilizations realized early on that they have messages that must be sent to other people that must be hidden from eyes that should not see the message.

While technology has drastically advanced this concept, the principle has been around since early civilizations. One of the most famous devices where cryptography was used was the Engima device created by the Germans after World War 1.

It was initially created for commercial purposes but it was heavily used during World War 2 to send encrypted messages between the Axis powers so that the Allies were unable to decipher the messages. Per an article in the New York Times the author shares, "German military assumed there simply wasn't enough time to break it," (NY Times, 2015). Thanks to the help of Alan Turing, a World War II code-breaking hero, the Allies were able to decipher the Engima machine which helped lead to winning World War II. One of the first examples of cryptography in history occurred in Mesopotamia around 1500 B.C.

Per an article entitled The Long and Winding History of Encryption, the author shares, "One very well written-up and documented cuneiform tablet in Mesopotamia, found around 1500 B.C. It was an encrypted message which craftsmen camouflaged the recipe for a pottery glaze that was a highly coveted item as the time," (Waddell, 2016).

I imagine it was very important to keep that recipe a secret to prevent it from being used by everyone. If all of Mesopotamia knew how to create the pottery glaze it would no longer be coveted. Unfortunately there is no way to truly prevent cryptography from being used for evil.

People will always want to send hidden messages whether they be for malicious purposes or simply to protect someone's livelihood. Some of the most famous examples of cryptography being used is during times of War where both sides are trying to send their forces messages without the opposition knowing what they are doing. Unless the world stops going to war, cryptography will always serve an evil purpose.

In the Bible Ephesians 4:25 teaches us, "Therefore, having put away falsehood, let each one of you speak the truth which his neighbor, for we are members one of another." If everyone in the world followed this teaching, cryptography would serve no evil purpose because everyone in the world would be completely transparent.

References: World War II's Greatest Hero: The True Story of Alan Turing. (2015, February 05). Retrieved March 20, 2018,

Waddell, K. (2016, January 13). The Long and Winding History of Encryption. Retrieved March 29, 2018

Verified Expert

In this assignment here we have observer that how the cryptography used in World war2. How the revolution bring into the cryptography technology.we have studied about cryptography.Here we have learned about truth table of OR and AND and XOR.Here we have also studied about how to pass communicate securely by cryptography.

Reference no: EM131920343

Questions Cloud

What are the annual storage costs associated with EOQ : AIA Inc. is looking to manage its cash position using the EOQ model. The interest rate is 2.20%. What are the annual storage costs associated with the EOQ?
Prepare a form 1065 for abc partnership : Prepare a form 1065 for ABC Partnership, including the Schedule K-1 for the partners and all other required schedules
Compute the change in the? portfolio value based : Compute the change in the? portfolio's value based on its starting value given in question and the estimated change in value from step
What are the annual order costs associated with the EOQ : The interest rate is 2.40%. What are the annual order costs associated with the EOQ?
Write reply to post related to cryptography : You need to write reply with 2 APA format references - Cryptography, as stated in the forum description, has been around since ancient times
Determine net present value : A company is considering 7 year property for tax purpose, Determine net present value and recommendation to the company
What is the optimal order amount according to the EOQ : If the interest rate is 2.80%, what is the optimal order amount according to the EOQ?
Create a security plan and procedures for system security : Create a security plan and procedures for the system security. Review risk analysis process based on identified security benchmarks.
Calculate cash conversion cycle : Calculate Chastain's cash conversion cycle. Assuming Chastain holds negligible amounts of cash and marketable securities, calculate total assets turnover-ROA

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd