Wednesday, January 1, 2020
The Ancient Egyptian Era - 1484 Words
When a message is in its original form it is known as plaintext or cleartext and the process that involves masking the text to hide the content is known as encryption. Once a message is encrypted it is referred to as ciphertext . Cryptography or crypto for short has always served the same purpose of encrypting information for reasons of privacy, deception, or security. Cryptographic methodologies could date back to the ancient Egyptian era where standard hieroglyphs were altered to mask true meaning . It is more likely that the first introduction of crypto followed the invention of writing and evolved in line with forms of communication. The use of crypto has been seen as extremely advantageous in times of war, where communicationâ⬠¦show more contentâ⬠¦Aim 2. The aim of this document is to provide an overview on the various cryptographic technologies in use today and what the future might hold. The document will cover the following subjects: a. Crypto authority and policy. b. Methods of Encryption: (1) Algorithmic encryption. (2) Public Key Infrastructure (PKI). (3) Public Key Encryption (PKE), symmetric and asymmetric. (4) Elliptic curve cryptography. c. Future concepts: (1) Quantum cryptography. Crypto authority and policy 3. Crypto Service for Defence (CSD). Information security within the MoD is of utmost importance when considering national security as a whole. Today information flows readily and can be easily accessible to the common user. Given the complexity and sensitivity of crypto within the MoD is key that authority for correct issue, handling and usage is established. The CSD working within the United Kingdom National Defence Association (NKNDA) and based in MoD Corsham, provide the delivery of cryptographic capability across the MoD. CSD implement MoD crypto policy for Communications Security (COMSEC) and crypto security in accordance with UK Government policy . CSD enforces these policies through inspections and audits and handles requests for crypto material. In general the department are responsible for the ordering, deployment and management of crypto material. 4. Communications Electronic Security Group (CESG). Minimum
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.