CRYPTOGRAPHY IN INFORMATION TECHNOLOGY



ABSTRACT
Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. Cryptography is used to ensure that the contents of a message are confidentiality transmitted and would not be altered. Confidentiality means nobody can understand the received message except the one who has the decipher key, and data cannot be changed means the original information would not be changed or modified; this is done when the sender includes a cryptography operation called a hash function in the original message. A hash function is a mathematical representation of the information, when any information arrives at its receiver; the receiver calculates the value of this hash function. If the receiver’s hash function value is equivalent to the sender’s, the integrity of the message is assured.

Keyword: Symmetric Encryption, Asymmetric Encryption,Hash Algorithm, Caesar Table.




TABLE OF CONTENT

Title Page

Certification i

Dedication ii


Table of Content iii

Abstract iv

Introduction 1

History of Cryptography 3

Cryptography Goals 7

Basic Terminology of Cryptography 8

Advancement in Cryptography 10

Symmetric and Asymmetric Encryption 12

Results and Comparison 19

Conclusion 20

Reference 21













Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

XAp8IZ05c0009a44f88b0.46724120, X. (2018). CRYPTOGRAPHY IN INFORMATION TECHNOLOGY. Afribary. Retrieved from https://beta.afribary.com/works/seminar-report-on-cryptography-in-information-technology-8085

MLA 8th

XAp8IZ05c0009a44f88b0.46724120, X1qJ3Hw5c0009a44dcda6.24836338 "CRYPTOGRAPHY IN INFORMATION TECHNOLOGY" Afribary. Afribary, 29 Jan. 2018, https://beta.afribary.com/works/seminar-report-on-cryptography-in-information-technology-8085. Accessed 24 Apr. 2025.

MLA7

XAp8IZ05c0009a44f88b0.46724120, X1qJ3Hw5c0009a44dcda6.24836338 . "CRYPTOGRAPHY IN INFORMATION TECHNOLOGY". Afribary, Afribary, 29 Jan. 2018. Web. 24 Apr. 2025. < https://beta.afribary.com/works/seminar-report-on-cryptography-in-information-technology-8085 >.

Chicago

XAp8IZ05c0009a44f88b0.46724120, X1qJ3Hw5c0009a44dcda6.24836338 . "CRYPTOGRAPHY IN INFORMATION TECHNOLOGY" Afribary (2018). Accessed April 24, 2025. https://beta.afribary.com/works/seminar-report-on-cryptography-in-information-technology-8085