| Peer-Reviewed

Cryptography: Salvaging Exploitations against Data Integrity

Received: 14 May 2013     Published: 10 June 2013
Views:       Downloads:
Abstract

Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) while altered text is ciphertext (CT). Conversion from PT to CT is called encoding/enciphering as codes that result from this process are called ciphers. The reverse operation is called decoding/deciphering. If a user tries to reverse the cipher by making meaning of it without prior knowledge of what method is used for encoding as the data was originally, not intended for the user, the process is called cracking, while such a user is a called a cryptanalyst. Cryptography is about communicating in the presence of an adversary (cryptanalyst) – and it embodies problems such as (encryption, authentication, key distribution to name a few). The field of cryptography and informatics provides a theoretical foundation based on which we may understand what exactly these problems are, how to evaluate protocols that purport to solve them, and how to build protocols in whose security we can have confidence. Thus, cryptography is the only practical means of sending and receiving data over an insecure channel from source to destination in such a way that other users cannot understand the message unless it was intended for them. Data sent over public network is not safe and the more ciphertext a cryptanalyst has, the easier it is to crack the ciphers. Thus, it is good to change the coding mechanism regularly – because, every coding scheme has a key set.

Published in American Journal of Networks and Communications (Volume 2, Issue 2)
DOI 10.11648/j.ajnc.20130202.14
Page(s) 47-55
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2013. Published by Science Publishing Group

Keywords

Ciphertext, Plaintext, Encryption, Decryption, Pseudo-Random Numbers, Ciphers

References
[1] Adewumi, S.E and Garba, E.J., Data security: cryptosystems algorithm using data compression and systems of non-linear equations, 2002, Nigerian Computer Society, Vol. 13
[2] Zeng, K., Psuedorandom bit generators in stream cipher cryptography, 1991, IEEE J. Computers, 24(2), pp 45 – 54.
[3] Davis, K.L., The art of ciphers, 2000, J. Comp and Info. Syst., ISSN: 2032-3765, pp 32
[4] Knuth, D., The art of computer programming — seminumerical algorithms, 2000, New Jersey, Prentice Hall publications
[5] Mendez, A., Van Oorschot, P and Vanstone, S Handbook of applied cryptography, 1997, New Jersey, CRC Press.
[6] Stallings, W and Van Slyke, R., Introduction to business data communication, 2008, McGraw hill publications.
[7] Tanenbaum, A.S., Computer networks, 1996 New Jersey, Prentice Hall publications.
[8] Aghware, F.O., A modified RSA encryption as implemented in the Nigerian banking software, 2005, Unpublished Masters thesis, Nnamdi Azi kiwe University: Awka-Nigeria
Cite This Article
  • APA Style

    A. A. Ojugo, A. O. Eboka, M. O. Yerokun, I. J. B. Iyawa, R. E. Yoro. (2013). Cryptography: Salvaging Exploitations against Data Integrity. American Journal of Networks and Communications, 2(2), 47-55. https://doi.org/10.11648/j.ajnc.20130202.14

    Copy | Download

    ACS Style

    A. A. Ojugo; A. O. Eboka; M. O. Yerokun; I. J. B. Iyawa; R. E. Yoro. Cryptography: Salvaging Exploitations against Data Integrity. Am. J. Netw. Commun. 2013, 2(2), 47-55. doi: 10.11648/j.ajnc.20130202.14

    Copy | Download

    AMA Style

    A. A. Ojugo, A. O. Eboka, M. O. Yerokun, I. J. B. Iyawa, R. E. Yoro. Cryptography: Salvaging Exploitations against Data Integrity. Am J Netw Commun. 2013;2(2):47-55. doi: 10.11648/j.ajnc.20130202.14

    Copy | Download

  • @article{10.11648/j.ajnc.20130202.14,
      author = {A. A. Ojugo and A. O. Eboka and M. O. Yerokun and I. J. B. Iyawa and R. E. Yoro},
      title = {Cryptography: Salvaging Exploitations against Data Integrity},
      journal = {American Journal of Networks and Communications},
      volume = {2},
      number = {2},
      pages = {47-55},
      doi = {10.11648/j.ajnc.20130202.14},
      url = {https://doi.org/10.11648/j.ajnc.20130202.14},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20130202.14},
      abstract = {Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) while altered text is ciphertext (CT). Conversion from PT to CT is called encoding/enciphering as codes that result from this process are called ciphers. The reverse operation is called decoding/deciphering. If a user tries to reverse the cipher by making meaning of it without prior knowledge of what method is used for encoding as the data was originally, not intended for the user, the process is called cracking, while such a user is a called a cryptanalyst. Cryptography is about communicating in the presence of an adversary (cryptanalyst) – and it embodies problems such as (encryption, authentication, key distribution to name a few). The field of cryptography and informatics provides a theoretical foundation based on which we may understand what exactly these problems are, how to evaluate protocols that purport to solve them, and how to build protocols in whose security we can have confidence. Thus, cryptography is the only practical means of sending and receiving data over an insecure channel from source to destination in such a way that other users cannot understand the message unless it was intended for them. Data sent over public network is not safe and the more ciphertext a cryptanalyst has, the easier it is to crack the ciphers. Thus, it is good to change the coding mechanism regularly – because, every coding scheme has a key set.},
     year = {2013}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Cryptography: Salvaging Exploitations against Data Integrity
    AU  - A. A. Ojugo
    AU  - A. O. Eboka
    AU  - M. O. Yerokun
    AU  - I. J. B. Iyawa
    AU  - R. E. Yoro
    Y1  - 2013/06/10
    PY  - 2013
    N1  - https://doi.org/10.11648/j.ajnc.20130202.14
    DO  - 10.11648/j.ajnc.20130202.14
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 47
    EP  - 55
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.20130202.14
    AB  - Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) while altered text is ciphertext (CT). Conversion from PT to CT is called encoding/enciphering as codes that result from this process are called ciphers. The reverse operation is called decoding/deciphering. If a user tries to reverse the cipher by making meaning of it without prior knowledge of what method is used for encoding as the data was originally, not intended for the user, the process is called cracking, while such a user is a called a cryptanalyst. Cryptography is about communicating in the presence of an adversary (cryptanalyst) – and it embodies problems such as (encryption, authentication, key distribution to name a few). The field of cryptography and informatics provides a theoretical foundation based on which we may understand what exactly these problems are, how to evaluate protocols that purport to solve them, and how to build protocols in whose security we can have confidence. Thus, cryptography is the only practical means of sending and receiving data over an insecure channel from source to destination in such a way that other users cannot understand the message unless it was intended for them. Data sent over public network is not safe and the more ciphertext a cryptanalyst has, the easier it is to crack the ciphers. Thus, it is good to change the coding mechanism regularly – because, every coding scheme has a key set.
    VL  - 2
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Mathematics/Computer, Federal University of Petroleum Resources Effurun, Delta State

  • Department of Computer Sci. Education, Federal College of Education (Technical) Asaba, Delta State

  • Department of Computer Sci. Education, Federal College of Education (Technical) Asaba, Delta State

  • Department of Computer Sci. Education, Federal College of Education (Technical) Asaba, Delta State

  • Department of Computer Science, Delta State Polytechnic Ogwashi-Uku, Delta State

  • Sections