Реферат: The Necessity Of Computer Security Essay Research

key, a sequence of eight numbers, each between 0 and 127. The other is a 2-key

system; in this approach to cryptography, a pair of mathematically complementary

keys, each containing as many as 200 digits, are used for encryptions and

decryption. In contrast with ciphers of earlier generations, where security

depended in part on concealing the algorithm, confidentiality of a computer

encrypted message hinges solely on the secrecy of the keys. Each system is

thought to encrypt a message so inscrutably that the step-by-step mathematical

algorithms can be made public without compromising security.

The single key system, named the Data Encryption Standard – DES for short -

was designed in 1977 as the official method for protecting unclassified computer

data in agencies of the American Federal government. Its evolution began in

1973 when the US National Bureau of Standards, responding to public concern

about the confidentiality of computerized information outside military and

diplomatic channels, invited the submission of data-encryption techniques as the

first step towards an encryption scheme intended for public use.

The method selected by the bureau as the DES was developed by IBM

researchers. During encryption, the DES algorithm divides a message into blocks

of eight characters, then enciphers them one after another. Under control of

the key, the letters and numbers of each block are scrambled no fewer than 16

times, resulting in eight characters of ciphertext.

As good as the DES is, obsolescence will almost certainly overtake it. The

life span of encryption systems tends to be short; the older and more widely

used a cipher is, the higher the potential payoff if it is cracked, and the

greater the likelihood that someone has succeeded.

An entirely different approach to encryption, called the 2-key or public-

key system, simplifies the problem of key distribution and management. The

approach to cryptography eliminates the need for subscribers to share keys that

must be kept confidential. In a public-key system, each subscriber has a pair

of keys. One of them is the so-called public key, which is freely available to

К-во Просмотров: 203
Бесплатно скачать Реферат: The Necessity Of Computer Security Essay Research