Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You need to write reply with 2 APA format references.

Cryptography, as stated in the forum description, has been around since ancient times when the written form of communication was used. Civilizations realized early on that they have messages that must be sent to other people that must be hidden from eyes that should not see the message.

While technology has drastically advanced this concept, the principle has been around since early civilizations. One of the most famous devices where cryptography was used was the Engima device created by the Germans after World War 1.

It was initially created for commercial purposes but it was heavily used during World War 2 to send encrypted messages between the Axis powers so that the Allies were unable to decipher the messages. Per an article in the New York Times the author shares, "German military assumed there simply wasn't enough time to break it," (NY Times, 2015). Thanks to the help of Alan Turing, a World War II code-breaking hero, the Allies were able to decipher the Engima machine which helped lead to winning World War II. One of the first examples of cryptography in history occurred in Mesopotamia around 1500 B.C.

Per an article entitled The Long and Winding History of Encryption, the author shares, "One very well written-up and documented cuneiform tablet in Mesopotamia, found around 1500 B.C. It was an encrypted message which craftsmen camouflaged the recipe for a pottery glaze that was a highly coveted item as the time," (Waddell, 2016).

I imagine it was very important to keep that recipe a secret to prevent it from being used by everyone. If all of Mesopotamia knew how to create the pottery glaze it would no longer be coveted. Unfortunately there is no way to truly prevent cryptography from being used for evil.

People will always want to send hidden messages whether they be for malicious purposes or simply to protect someone's livelihood. Some of the most famous examples of cryptography being used is during times of War where both sides are trying to send their forces messages without the opposition knowing what they are doing. Unless the world stops going to war, cryptography will always serve an evil purpose.

In the Bible Ephesians 4:25 teaches us, "Therefore, having put away falsehood, let each one of you speak the truth which his neighbor, for we are members one of another." If everyone in the world followed this teaching, cryptography would serve no evil purpose because everyone in the world would be completely transparent.

References: World War II's Greatest Hero: The True Story of Alan Turing. (2015, February 05). Retrieved March 20, 2018,

Waddell, K. (2016, January 13). The Long and Winding History of Encryption. Retrieved March 29, 2018

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92759006
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Take the master boot record from this weeks module and use

Take the master boot record from this week's module and use it as a file input for your program. It will be named block.dd and you can assume that it's in your current directory so you don't have to provide a path to it. ...

Subject digital securityprovide an fidm authentication

Subject : Digital Security Provide an FIdM authentication system that you have used (being subjet to). Tell the name of the organizations acted as the IdP (Identity Provider) and SP (Service Provider)?

Question suppose you have two arrays of 8-bit signed

Question : Suppose you have two arrays of 8-bit signed integers P[i] and Q[i] for 0 = i A pointer to the array P is passed in register X and a pointer to the array Q is passed in register Y. The number of elements in eac ...

Solve the following problem from fibonaccis liber abacia

Solve the following problem from Fibonacci's Liber abaci: A man left to his eldest son one bezant and a seventh of what was left; then from the remainder, to his next son he left two bezants and a seventh of what was lef ...

How does understanding various microsoft office

How does understanding various Microsoft Office applications enhance productivity in education, the workplace, and at home?

Suppose our task is to distinguish between humans and

Suppose our task is to distinguish between humans and non-human objects in an image, which classifier would you choose and why? Decision trees, perceptrons or neural nets.

Question a student has a first name fname a last name lname

Question : A student has a first name (fname), a last name (lname), an identification number (id), a gender (male/female), a course name (cname) and the number of lectures (lcount) attended by the student. a. Define gend ...

Question classyou need to research the topic and discuss

Question: Class, You need to research the topic and discuss the topic in at 500 words with references. Then, reference will not count as a discussion. Question: What would be the impact of predictive modeling on healthca ...

At a certain temperature 0317 mol of ch4 and 0719 mol of

At a certain temperature, 0.317 mol of CH4 and 0.719 mol of H2O is placed in a 4.00 L container. CH4(g)+2H20(g) ---, CO2 (g) +4H2 (g) At equilibrium, 4.80 g of CO2 is present. Calculate Kc.

Rgb ledsthree light-emitting diodes leds one red one green

RGB LED's Three light-emitting diodes [LEDs] (one red, one green, one blue) turn on when a number 0-7 is passed through. Red turns on with even numbers, green turns on with odd numbers, blue turns on with multiples of 3. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As