Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) while altered text is ciphertext (CT). Conversion from PT to CT is called encoding/enciphering as codes that result from this process are called ciphers. The reverse operation is called decoding/deciphering. If a user tries to reverse the cipher by making meaning of it without prior knowledge of what method is used for encoding as the data was originally, not intended for the user, the process is called cracking, while such a user is a called a cryptanalyst. Cryptography is about communicating in the presence of an adversary (cryptanalyst) – and it embodies problems such as (encryption, authentication, key distribution to name a few). The field of cryptography and informatics provides a theoretical foundation based on which we may understand what exactly these problems are, how to evaluate protocols that purport to solve them, and how to build protocols in whose security we can have confidence. Thus, cryptography is the only practical means of sending and receiving data over an insecure channel from source to destination in such a way that other users cannot understand the message unless it was intended for them. Data sent over public network is not safe and the more ciphertext a cryptanalyst has, the easier it is to crack the ciphers. Thus, it is good to change the coding mechanism regularly – because, every coding scheme has a key set.
Published in | American Journal of Networks and Communications (Volume 2, Issue 2) |
DOI | 10.11648/j.ajnc.20130202.14 |
Page(s) | 47-55 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2013. Published by Science Publishing Group |
Ciphertext, Plaintext, Encryption, Decryption, Pseudo-Random Numbers, Ciphers
[1] | Adewumi, S.E and Garba, E.J., Data security: cryptosystems algorithm using data compression and systems of non-linear equations, 2002, Nigerian Computer Society, Vol. 13 |
[2] | Zeng, K., Psuedorandom bit generators in stream cipher cryptography, 1991, IEEE J. Computers, 24(2), pp 45 – 54. |
[3] | Davis, K.L., The art of ciphers, 2000, J. Comp and Info. Syst., ISSN: 2032-3765, pp 32 |
[4] | Knuth, D., The art of computer programming — seminumerical algorithms, 2000, New Jersey, Prentice Hall publications |
[5] | Mendez, A., Van Oorschot, P and Vanstone, S Handbook of applied cryptography, 1997, New Jersey, CRC Press. |
[6] | Stallings, W and Van Slyke, R., Introduction to business data communication, 2008, McGraw hill publications. |
[7] | Tanenbaum, A.S., Computer networks, 1996 New Jersey, Prentice Hall publications. |
[8] | Aghware, F.O., A modified RSA encryption as implemented in the Nigerian banking software, 2005, Unpublished Masters thesis, Nnamdi Azi kiwe University: Awka-Nigeria |
APA Style
A. A. Ojugo, A. O. Eboka, M. O. Yerokun, I. J. B. Iyawa, R. E. Yoro. (2013). Cryptography: Salvaging Exploitations against Data Integrity. American Journal of Networks and Communications, 2(2), 47-55. https://doi.org/10.11648/j.ajnc.20130202.14
ACS Style
A. A. Ojugo; A. O. Eboka; M. O. Yerokun; I. J. B. Iyawa; R. E. Yoro. Cryptography: Salvaging Exploitations against Data Integrity. Am. J. Netw. Commun. 2013, 2(2), 47-55. doi: 10.11648/j.ajnc.20130202.14
AMA Style
A. A. Ojugo, A. O. Eboka, M. O. Yerokun, I. J. B. Iyawa, R. E. Yoro. Cryptography: Salvaging Exploitations against Data Integrity. Am J Netw Commun. 2013;2(2):47-55. doi: 10.11648/j.ajnc.20130202.14
@article{10.11648/j.ajnc.20130202.14, author = {A. A. Ojugo and A. O. Eboka and M. O. Yerokun and I. J. B. Iyawa and R. E. Yoro}, title = {Cryptography: Salvaging Exploitations against Data Integrity}, journal = {American Journal of Networks and Communications}, volume = {2}, number = {2}, pages = {47-55}, doi = {10.11648/j.ajnc.20130202.14}, url = {https://doi.org/10.11648/j.ajnc.20130202.14}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20130202.14}, abstract = {Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) while altered text is ciphertext (CT). Conversion from PT to CT is called encoding/enciphering as codes that result from this process are called ciphers. The reverse operation is called decoding/deciphering. If a user tries to reverse the cipher by making meaning of it without prior knowledge of what method is used for encoding as the data was originally, not intended for the user, the process is called cracking, while such a user is a called a cryptanalyst. Cryptography is about communicating in the presence of an adversary (cryptanalyst) – and it embodies problems such as (encryption, authentication, key distribution to name a few). The field of cryptography and informatics provides a theoretical foundation based on which we may understand what exactly these problems are, how to evaluate protocols that purport to solve them, and how to build protocols in whose security we can have confidence. Thus, cryptography is the only practical means of sending and receiving data over an insecure channel from source to destination in such a way that other users cannot understand the message unless it was intended for them. Data sent over public network is not safe and the more ciphertext a cryptanalyst has, the easier it is to crack the ciphers. Thus, it is good to change the coding mechanism regularly – because, every coding scheme has a key set.}, year = {2013} }
TY - JOUR T1 - Cryptography: Salvaging Exploitations against Data Integrity AU - A. A. Ojugo AU - A. O. Eboka AU - M. O. Yerokun AU - I. J. B. Iyawa AU - R. E. Yoro Y1 - 2013/06/10 PY - 2013 N1 - https://doi.org/10.11648/j.ajnc.20130202.14 DO - 10.11648/j.ajnc.20130202.14 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 47 EP - 55 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.ajnc.20130202.14 AB - Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) while altered text is ciphertext (CT). Conversion from PT to CT is called encoding/enciphering as codes that result from this process are called ciphers. The reverse operation is called decoding/deciphering. If a user tries to reverse the cipher by making meaning of it without prior knowledge of what method is used for encoding as the data was originally, not intended for the user, the process is called cracking, while such a user is a called a cryptanalyst. Cryptography is about communicating in the presence of an adversary (cryptanalyst) – and it embodies problems such as (encryption, authentication, key distribution to name a few). The field of cryptography and informatics provides a theoretical foundation based on which we may understand what exactly these problems are, how to evaluate protocols that purport to solve them, and how to build protocols in whose security we can have confidence. Thus, cryptography is the only practical means of sending and receiving data over an insecure channel from source to destination in such a way that other users cannot understand the message unless it was intended for them. Data sent over public network is not safe and the more ciphertext a cryptanalyst has, the easier it is to crack the ciphers. Thus, it is good to change the coding mechanism regularly – because, every coding scheme has a key set. VL - 2 IS - 2 ER -