Write reply to post related to cryptography

Assignment Help Computer Engineering
Reference no: EM131920343

You need to write reply with 2 APA format references.

Cryptography, as stated in the forum description, has been around since ancient times when the written form of communication was used. Civilizations realized early on that they have messages that must be sent to other people that must be hidden from eyes that should not see the message.

While technology has drastically advanced this concept, the principle has been around since early civilizations. One of the most famous devices where cryptography was used was the Engima device created by the Germans after World War 1.

It was initially created for commercial purposes but it was heavily used during World War 2 to send encrypted messages between the Axis powers so that the Allies were unable to decipher the messages. Per an article in the New York Times the author shares, "German military assumed there simply wasn't enough time to break it," (NY Times, 2015). Thanks to the help of Alan Turing, a World War II code-breaking hero, the Allies were able to decipher the Engima machine which helped lead to winning World War II. One of the first examples of cryptography in history occurred in Mesopotamia around 1500 B.C.

Per an article entitled The Long and Winding History of Encryption, the author shares, "One very well written-up and documented cuneiform tablet in Mesopotamia, found around 1500 B.C. It was an encrypted message which craftsmen camouflaged the recipe for a pottery glaze that was a highly coveted item as the time," (Waddell, 2016).

I imagine it was very important to keep that recipe a secret to prevent it from being used by everyone. If all of Mesopotamia knew how to create the pottery glaze it would no longer be coveted. Unfortunately there is no way to truly prevent cryptography from being used for evil.

People will always want to send hidden messages whether they be for malicious purposes or simply to protect someone's livelihood. Some of the most famous examples of cryptography being used is during times of War where both sides are trying to send their forces messages without the opposition knowing what they are doing. Unless the world stops going to war, cryptography will always serve an evil purpose.

In the Bible Ephesians 4:25 teaches us, "Therefore, having put away falsehood, let each one of you speak the truth which his neighbor, for we are members one of another." If everyone in the world followed this teaching, cryptography would serve no evil purpose because everyone in the world would be completely transparent.

References: World War II's Greatest Hero: The True Story of Alan Turing. (2015, February 05). Retrieved March 20, 2018,

Waddell, K. (2016, January 13). The Long and Winding History of Encryption. Retrieved March 29, 2018

Verified Expert

In this assignment here we have observer that how the cryptography used in World war2. How the revolution bring into the cryptography technology.we have studied about cryptography.Here we have learned about truth table of OR and AND and XOR.Here we have also studied about how to pass communicate securely by cryptography.

Reference no: EM131920343

Questions Cloud

What are the annual storage costs associated with EOQ : AIA Inc. is looking to manage its cash position using the EOQ model. The interest rate is 2.20%. What are the annual storage costs associated with the EOQ?
Prepare a form 1065 for abc partnership : Prepare a form 1065 for ABC Partnership, including the Schedule K-1 for the partners and all other required schedules
Compute the change in the? portfolio value based : Compute the change in the? portfolio's value based on its starting value given in question and the estimated change in value from step
What are the annual order costs associated with the EOQ : The interest rate is 2.40%. What are the annual order costs associated with the EOQ?
Write reply to post related to cryptography : You need to write reply with 2 APA format references - Cryptography, as stated in the forum description, has been around since ancient times
Determine net present value : A company is considering 7 year property for tax purpose, Determine net present value and recommendation to the company
What is the optimal order amount according to the EOQ : If the interest rate is 2.80%, what is the optimal order amount according to the EOQ?
Create a security plan and procedures for system security : Create a security plan and procedures for the system security. Review risk analysis process based on identified security benchmarks.
Calculate cash conversion cycle : Calculate Chastain's cash conversion cycle. Assuming Chastain holds negligible amounts of cash and marketable securities, calculate total assets turnover-ROA

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionstudy on the internet to determine ways that

questionstudy on the internet to determine ways that technology has changed cafe or coffee shop industry in past

  Estimate the future growth opportunities of summit

the two companies will need to merge their business information systems or find a new one that will work in a

  What capabilities does oracle have as a support tool

What capabilities does Oracle have as a support tool? What is computer forensics? Name some commonly used computer forensics tools.

  Suppose you are maintaining information on offices

explain the different ways of implementing one-to-one relationships. Assume you are maintaining information on offices (office numbers, buildings, and phone numbers) and faculty (numbers and names).

  Why does bullet server have uncommitted and committed files

The bullet server support immutable file for its user. Are bullet server's own table also immutable? Why does bullet server have uncommitted and committed file?

  Relationship between mis and information technology

What is the relationship between management information systems and information technology (IT).

  Discuss the steps that would be needed to extend polynomial

Discuss the steps that would be needed to extend the polynomial calculator so that it would process polynomials in several variables.

  Discuss the implications for the last part of problem

Consider fully developed laminar flow of a constant-property fluid in a circular tube. At a particular flow cross section calculate the total axial momentum.

  Review problem on software development

Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed.

  Which skills are employers seeking

Beyond the technical skills your degree does/will provide, what other skills are employers seeking? Have a look at job advertisments such as those in CareerOne. Other than technical skills, which skills are employers seeking?

  Computer forensics investigation

As a new computer forensics investigator and as a matter of the forensics policy and procedure, you will require to understand the procedures for processing incident scene for the digital and the logical evidence.

  Compare relative merits of super pipelined and super scalar

Describe the conditions under which an n-stage pipeline is n times faster than a serial machine.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd