Essay on Ethical Issues in Secured Communications


Essay on Ethical Issues in Secured Communications


Ethical Issues in Secured Communications



1. Introduction



The outstanding growth of network technologies in the past decade have contributed to millions of new applications and industries. Literally millions of companies around the world were created to serve this huge growth. Even though many of those companies did not survive until the present time, most of the applications did survive and they are still widely used among consumers of all ages, cultures, and backgrounds.



Most of the widely used applications are not secured. I will define what is meant by a secured communication later in the paper. However, this paper is more concerned in the way people use these applications in terms of identity. Many applications allow ... Show more content on Helpwriting.net ...2. Background



2.1 Security Background



2.1.1 Secured Communications



Security and privacy are not new concepts. At 400 BC the Greeks used a transposition cipher. Individual letters were written on a long thin sheet of paper and then wrapped around a cylinder. The diameter of the cylinder was the key to find out the original letter. In this context, I find it necessary to give some definitions of related vocabulary in this field.



–Plain text or PT is the original message that we need to send. Usually we do not want others to be able to know our original message.



–Cipher text or CT is the encrypted plain text which is not readable for others.



–Encryption is the process of changing a secret message (plain text) into a disguised one (cipher text).



–Decryption is the process of changing the Cipher text back to the original Plain text.



–Cryptography (literally means secret writing) is the science encompassing the principles and methods of transforming a PT message into a CT one, and then retransforming that message back to its original form.



–cryptanalysis the study of principles and methods of transforming a CT message back into a PT message without knowledge of the key. Also called code breaking



–cryptology both cryptography and cryptanalysis



We encrypt the PT to get the CT and then send it on a communication channel. The channel


... Get more on HelpWriting.net ...


No comments:

Post a Comment

sample term paper about information technology

@page { size: auto; margin: 0mm; } html { background-color: #FFFFFF; margin: 0px; } body { margin: 1mm 1mm 1mm 1mm; } ...