I. INTRODUCTIONThe wrong message in the wrong hands can alter the course of history. Fast forward to 1945, encryption was rampant. The Germans used Enigma machines, making it nearly impossible for the Allies to decode their messages, or so they thought. Little did the Germans know that the Allies were able to reverse engineer it, exposing the war plans and helping to end the war. The Allies nicknamed all information involving the Germans “Ultra”. Using Ultra, the Allies were able to find German naval and land positions and eliminate land installations when the enemy least expected it. Although the physical device was nearly inviolable, a leak in 1931, when the German Ministry of Defense handed over the Enigma machine manuals to the French, led to their downfall [1]. Using the manual the Allies created a replica, allowing any code to be read. Looking back on this, we can learn how easy it is to ruin theoretically perfect code due to human error. The word cryptography comes from the Greek word kryptos, meaning hidden. The idea behind encryption is to allow two people to communicate secretly without others reading or altering the message. Even if an outside person somehow intercepts this message, they will not be able to translate it into readable form putting an end to any information leak. The initial code involved codes (keys) that simply moved the alphabet up a pair of letters by a predetermined amount that both the sender and recipient would know. Although this type of encryption can be easily broken today, we have many advanced methods to protect our information flow. Cyber security is a vast field of information technology that will only grow as humans invent increasingly complex coding methods.II. BASICS There are three main ideas in cryptography... half the paper... to authenticate who sent the message using a digital certificate. When the sender transmits information to the recipient, he also includes a signature (digital certificate) encrypted with his public key. Once the recipient receives the encrypted digital certificate, the sender's public key is used to verify whether the sender is really who he identifies himself as [11].IV. PROMISE AND LIMITATIONS Cybersecurity is an important part of our growing world. More business is conducted through the Internet than ever before. Therefore, it is important to keep our information safe, because currently information is a commodity. The need for encryption will never decrease. There is always data that needs to be encrypted, and in our lifetime it will only get faster and easier. As further advances are made in the field of mathematics, new algorithms are formed from those discoveries.
tags