Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
23 pages
1 file
This entry provides an overview of how cryptography is used to fulfil the right of privacy in communications. The authors summarise the essential milestones in the evolution of cryptography, covering from the ancient Egypt to the modern use of computers, and detail the theoretical grounds and main applications of modern cryptography. Once the current state of the art is outlined, the entry deepens into the modern debates on the use of encryption to guarantee the right of privacy in public communications channels such as the Internet. In this regard, the work describes the events of the so-called Crypto Wars and examines the nothing-to-hide argument as the most usual argument employed to prevent the use of encryption. Finally, the authors give their view on some future trends and applications of cryptography in the forthcoming years.
Cryptography, 2021
Cryptography is traditionally considered as a main information security mechanism, providing several security services such as confidentiality, as well as data and entity authentication. This aspect is clearly relevant to the fundamental human right of privacy, in terms of securing data from eavesdropping and tampering, as well as from masquerading their origin. However, cryptography may also support several other (legal) requirements related to privacy. For example, in order to fulfil the data minimisation principle—i.e., to ensure that the personal data that are being processed are adequate and limited only to what is necessary in relation to the purposes for which they are processed—the use of advanced cryptographic techniques such as secure computations, zero-knowledge proofs or homomorphic encryption may be prerequisite. In practice though, it seems that the organisations performing personal data processing are not fully aware of such solutions, thus adopting techniques that po...
This paper may serve as a general introduction to computer cryptography for jurists and privacy scholars, and simultaneously as an typology of the legislation and regulation of “crypto” for technologists. Attention is given to the many aspects of encryption in society and its connection with the diffuse concept of privacy rights. The research attempts to make a retrospective critical analysis of the societal impact of encryption and computer security, and attempts to draw lessons for current and possible future conflicts between basic rights in rule of law democracies. Critical reflections and arguments on debated political issues surrounding encryption regulation, privacy and security are provided.
2013
This investigation argues that cryptography is a very effective technique to protect highly confidential and valuable information from cyber criminals. Information security is becoming one of the hot topics around the world. The need for modern cryptography to provide techniques and keys to protect information is vital. The process of encryption and decryption is essential for the communication of highly sensitive information. This inquiry emphasizes that without cryptography, private information such as credit card details, passwords and identity card numbers will be accessible to cyber criminals. This study also discusses relevant topics such as the definitions of cryptography, history of cryptography, principles and types of cryptography. Even though cryptography is used to convert information into unreadable format, we cannot be absolutely sure that confidential data would not be accessed by cyber criminals who seem to be getting smarter and smarter by the day. Technological adv...
International Journal of Engineering Science and Computing, 2018
The internet and information technology generally is changing the way of life of mankind. The act of exchange of word messages involves exchange of other forms of data-pictures, videos, commands for financial transactions and recently, storage of data on and access software and computing services through cloud computing. When we go online, we are doing much more than a passive absorption of information, reading articles and blogs. We are also sending out very sensitive data. Furthermore, on transaction online whether, buying goods/services or signing up for an online account, we send out a lot of personal and sensitive information like names, physical address, email address, passwords, PINs, credit card information, private correspondence, sensitive company information and Bank-account information is send out. Most of the contents that are store on the hardware and software as well as on the virtual cloud include sensitive and personal data that individuals are unwilling to let others access to. This makes security a major concern on the internet. Before now, one could ensure this by securing access to networks, software and hardware through a complicated system of controls. Passwords and other technology security architecture of password control and authorised access was breached and continues to be breached by the actions of hackers, technology experts specialising in either by passing the controls or figuring probabilities so that which we thought was secure, is not more. This paper examines the arguments for and against encryption especially in the context of privacy protection of individuals, analyses the Nigerian context and compares the argument in other more responsive jurisdictions. It further makes recommendations for strategic global actions as well as strategic third world and African action to maximise the gains and reduces vulnerabilities.
The general purpose of this paper is to address five fairly simple questions regarding privacy and cryptology over the explosive growth of computers and networks. These questions are as follows:
Social Science Research Network, 2011
The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidential. Cryptography provides a solution to this problem, but it has spawned a heated policy debate. Some government agencies want to restrict the use of data encryption because they fear that criminals and spies may use the technology to their own advantage. However, Encryption Techniques so far have both advantages and disadvantages to society, and issues about abuse require a formularized policy.
… Cyberspace: Civil Liberties, Human Rights, and the …, 1999
2019
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations have revolutionized societies. The printing press is an often-cited example of the great impact one humble person’s invention can have on ruling dynasties, world religions, and personal life.. Quantum encryption could rival Guttenberg’s printing press in its impact. Cryptology has a fascinating History., In Warfare Cryptography is a broad, sticky, and mathematically complex, but interesting subject and an integral part of the evolution of warfare. So let’s get some definitions out of the way first. Cryptology is the study of codes, both creating and solving them. Cryptography is the art of creating codes. Cryptanalysis is the art of surreptitiously revealing the contents of coded messages, breaking codes, that were not intended for you as a recipient....
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021
As the means of communications matured and developed so did the need of secret message keeping, as we discover new and more sophisticated cryptographic techniques are being developed to aid in securing the communications between sender and receiver. Some of cryptographers started to come up with new techniques to hide the data using new encryption methods while others came up with new techniques to break the said encryption methods and this led to many great evolutions in the communication sector, as the communications became digital from analog secret message keeping became far more important and led to the introduction of various protocols and frameworks to support their need of secret message keeping.
2015
Encryption and ciphers have been significant in diplomacy, military activities, privacy for individuals, and have allowed for free communications even in areas without free speech. Encryption is necessary for the proper functioning of the Internet, because it allows private and secure transactions and can help ensure the identities of all parties.1 Authentication through encryption provides a layer of security on the Internet that helps prevent fraud and impersonation.2 Without encryption, it would be impossible to safely make purchases, carry out banking, or perform most other actions which require confirmation of identity online.3 Innovative uses of encryption have even allowed the creation of purely digital currencies which can be exchanged in relative anonymity.4 But encryption has also allowed illicit communications and materials to remain undetected. It has helped conceal attempts at
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Advanced Sciences and Technologies for Security Applications, 2021
International Journal of Networks and Systems, 2024
Iconic Research and Engineering Journals, 2019
The Journal of Information, …, 1997
Computer Fraud & Security, 1996
Journal of Logic and Computation, 2002
2001
Research Journal of Engineering and Technology, 2020
IEE Proceedings F Communications, Radar and Signal Processing
Knowledge, Technology & Policy, 2000
IntechOpen eBooks, 2023