<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Navajo Code Talkers &#187; Cryptography</title>
	<atom:link href="https://navajocodetalkers.org/category/cryptography/feed/" rel="self" type="application/rss+xml" />
	<link>https://navajocodetalkers.org</link>
	<description>Interviews, Videos &#38; More</description>
	<lastBuildDate>Fri, 09 Aug 2019 02:06:34 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.8.41</generator>
	<item>
		<title>Types of Cryptography</title>
		<link>https://navajocodetalkers.org/types-of-cryptography/</link>
		<comments>https://navajocodetalkers.org/types-of-cryptography/#comments</comments>
		<pubDate>Thu, 01 May 2014 10:00:47 +0000</pubDate>
		<dc:creator><![CDATA[navajocodetalkersadmin]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>

		<guid isPermaLink="false">https://navajocodetalkers.org/?p=105</guid>
		<description><![CDATA[Before you try to learn about the different types of cryptography, you should know what it is all about. By definition, cryptography is the technique or discipline that uses mathematics to cipher and decipher information. Mathematical language is used to code and decode sensitive or secret information. However, this is mainly used for virtual and hard copy texts/information. Cryptography Systems If you dig deeper into cryptography, you will realize that it is usually a complicated process. Therefore, becoming a cryptographer is quite challenging. You must be aware that there are two types or kinds of systems, namely: 1. Symmetric System [...]]]></description>
				<content:encoded><![CDATA[<p>Before you try to learn about the different types of cryptography, you should know what it is all about. By definition, cryptography is the technique or discipline that uses mathematics to cipher and decipher information. Mathematical language is used to code and decode sensitive or secret information. However, this is mainly used for virtual and hard copy texts/information.</p>
<p><iframe width="640" height="360" src="//www.youtube.com/embed/ERp8420ucGs" frameborder="0" allowfullscreen></iframe></p>
<h3>Cryptography Systems</h3>
<p>If you dig deeper into cryptography, you will realize that it is usually a complicated process. Therefore, becoming a cryptographer is quite challenging. You must be aware that there are two types or kinds of systems, namely:</p>
<p><strong>1.</strong> Symmetric System or Secret Key Cryptography<br />
<strong>2.</strong> Asymmetric System or Public Key Cryptography</p>
<p>The term ‘key’ pertains to an algorithms numerical value that is used to alter or cipher information. The result is more secured information and only those people with the matching key will be able to view or recover the info in readable format. </p>
<h3>Symmetric Cryptography</h3>
<p>Under the symmetric cryptography, only one key is used to encrypt and decrypt information. Before a secret info is sent, the sender encrypts the message using the key, and the same key will be used to decrypt the message. This is a good option for those who usually communicate with only a number of people. However, if you usually send info over a large number of recipients, this is not the best choice. </p>
<h3>Asymmetric Cryptography</h3>
<p>Another type is asymmetric cryptography. Under this system, a pair of keys is used to encrypt and decrypt information. A public key is used for encryption purposes, and the information can only be decoded using the corresponding private key. Even if you tell everyone about the public key, you are the only one who can decode the encrypted message because you alone know the private key. </p>
<p><iframe width="640" height="360" src="//www.youtube.com/embed/UIDGZf3GgXk" frameborder="0" allowfullscreen></iframe></p>
<h3>Protecting Information</h3>
<p>In today’s advanced and modern times, hackers and other cybercriminals are working double time to decode encryptions. However, if you’re using the standard systems, you can be sure that confidential information can’t be accessed by unauthorized individuals. </p>
<p>Now that you know the two types of cryptography, you will be able to weigh the pros and cons of each. More and more people favor the asymmetric cryptography over the symmetric because of the obvious advantages. Regardless of the option that you choose, you have to make sure that the keys are kept secret. Once the key is made known to unwanted parties, this is where problems can set in. In the case of the asymmetric cryptography, you don’t have to worry even if other people know the public key. However, with symmetric cryptography, the security of the information is compromised once the key is made known to others. </p>
<p>Before you use cryptography, it is important that you learn the basics. You must choose the type that will work for you and the industry where you belong. Today, electronic messages or information use this discipline so that even when others intercept the message, they will not be able to understand it. </p>
<p>Learn the basics and keep sensitive information secured all the time!</p>
]]></content:encoded>
			<wfw:commentRss>https://navajocodetalkers.org/types-of-cryptography/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Pairing Based Cryptography</title>
		<link>https://navajocodetalkers.org/pairing-based-cryptography/</link>
		<comments>https://navajocodetalkers.org/pairing-based-cryptography/#comments</comments>
		<pubDate>Sat, 26 Apr 2014 10:00:50 +0000</pubDate>
		<dc:creator><![CDATA[navajocodetalkersadmin]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>

		<guid isPermaLink="false">https://navajocodetalkers.org/?p=108</guid>
		<description><![CDATA[Pairing based crypto has a crucial role played in the world of problems and computations. For those who are much interested to know about it, consider the following details. What Is It? Pairing-based cryptography refers to the usage of pairing in between 2 cryptographic group elements to the 3rd group in constructing cryptographic systems. When similar group has been used for first 2 groups, pairing will be called as “symmetric” and the mapping coming from 2 elements of a group to the element from the second group. This is the way in which pairings could be utilized in reduction of [...]]]></description>
				<content:encoded><![CDATA[<p>Pairing based crypto has a crucial role played in the world of problems and computations. For those who are much interested to know about it, consider the following details. </p>
<h3>What Is It?</h3>
<p>Pairing-based cryptography refers to the usage of pairing in between 2 cryptographic group elements to the 3rd group in constructing cryptographic systems. When similar group has been used for first 2 groups, pairing will be called as “symmetric” and the mapping coming from 2 elements of a group to the element from the second group. This is the way in which pairings could be utilized in reduction of hard problems in a group to the different. Most of the time, there is an easier problem compared to another group. </p>
<p><iframe width="640" height="360" src="//www.youtube.com/embed/08RAPECJldE" frameborder="0" allowfullscreen></iframe></p>
<p>For instance, in some groups which are equipped with the bilinear mapping like Tate Pairing or Weil Pairing, the generalizations of computational Diffie-Hellman problem were believed as infeasible while simpler decisional Diffie-Hellman problem could get easily solved with the use of pairing function. The 1st group is called as the Gap Group. It is due to the assumed difference when it comes to difficulty in between the two problems in a group. </p>
<h3>Major Advances</h3>
<p>In the pairing based cryptography world, there have been several new and exciting developments. These changes greatly impact on the field of public-key cryptography which affect people the code breakers and code makers, to crypto guidelines and published standards. Take a close look at such changes as well as the impact they provided. </p>
<h3>Schemes Security Pairing-Based Crypto</h3>
<p>The pairing based cryptography schemes security has been derived on level of difficulty of resolving the DLP or discrete logarithm problem in certain finite fields. Such finite fields have been big enough in which the DLP has been hard, but small enough in which computations have been efficient. At the same time, their memory ad bandwidth requirements have been reasonable as well. Options include working over fields having 2^k or even 3^k elements; prime fields having p elements (finite fields in this case are known to have “characteristic” 2, 3, or even p respectively). Guidelines are to maintain the fields’ size roughly about 2, 000 bits. </p>
<p><iframe width="640" height="360" src="//www.youtube.com/embed/ClnGVVWmHmU" frameborder="0" allowfullscreen></iframe></p>
<h3>Recent Breakthroughs</h3>
<p>The most recent results had indicated that the finite fields of smaller characteristic have not been suitable for pairing based cryptography. It is because the DLP had already been solved in the finite field of 2^6120 elements. The methods need to be applied to the characteristic 3 also. Ternary and binary finite fields have been normally utilized with the supersingular elliptic curves. Thus, ordinary curves are covering larger prime fields that currently remained unaffected by results. They are also viable options when it comes to pairing based crypto. </p>
<h3>Recent Advances Impact on Cryptography Field</h3>
<p>The breakthroughs can provide a big impact on the cryptography field. These will redirect the code maker course, renew code breaker inspi3ration and require revision and review of crypto guidelines and published standards. Research is centered on scheme development with the use of elliptic curves over the smaller characteristic. It assumes that this particular setup has been secure but it must be a death knell in terms of pairing based cryptography on curves. Those cryptographers could focus on the efforts on promising parameters to be used in practice.</p>
]]></content:encoded>
			<wfw:commentRss>https://navajocodetalkers.org/pairing-based-cryptography/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Prime Numbers Cryptography</title>
		<link>https://navajocodetalkers.org/prime-numbers-cryptography/</link>
		<comments>https://navajocodetalkers.org/prime-numbers-cryptography/#comments</comments>
		<pubDate>Mon, 21 Apr 2014 10:00:52 +0000</pubDate>
		<dc:creator><![CDATA[navajocodetalkersadmin]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>

		<guid isPermaLink="false">https://navajocodetalkers.org/?p=57</guid>
		<description><![CDATA[Prime numbers have been a part of the exclusive intellectual conception world. Primality’s basic notion could be accessible to children but no ordinary mind can harbor anything just like the complete picture. In contemporary years, theoreticians are pursuing to grapple the prime number profundity. At the same time, vast resources and toil were directed into the computational aspects. It includes the task of applying, finding and characterizing primes in some domains. Practical Uses of Prime Numbers in Cryptography Most of the new cryptography methods have been based heavily on prime numbers. Other exceptional encoding schemes need 2 prime products to [...]]]></description>
				<content:encoded><![CDATA[<p>Prime numbers have been a part of the exclusive intellectual conception world. Primality’s basic notion could be accessible to children but no ordinary mind can harbor anything just like the complete picture. In contemporary years, theoreticians are pursuing to grapple the prime number profundity. At the same time, vast resources and toil were directed into the computational aspects. It includes the task of applying, finding and characterizing primes in some domains. </p>
<p><iframe width="640" height="480" src="//www.youtube.com/embed/56fa8Jz-FQQ" frameborder="0" allowfullscreen></iframe></p>
<h3>Practical Uses of Prime Numbers in Cryptography </h3>
<p>Most of the new cryptography methods have been based heavily on prime numbers. Other exceptional encoding schemes need 2 prime products to continue the encoding. However, they require that the prime themselves should perform the decoding. Generally, it is totally difficult to locate factors of the number than multiply the 2 numbers. </p>
<p>For instance, when 2 primes are picked and multiply these together, and the product is given, encoding will be done with use of product. The encoded message will be sent and decode this since the 2 numbers are known. It is called as the ‘public’ method since the product can be given to anybody. Aside from that, there have been several algorithms present in computer science which have been depending heavily on these prime numbers. They include sorting schemes and hashing schemes. </p>
<h3>The Essence of Primality Testing for Cryptography</h3>
<p>Prime numbers cryptography had attracted great attention from theoreticians and mathematicians for the past centuries. The very first actual prime number use in the essence area out of the number theory has been discovered in 1900s. It has been the foundation of the technical system that would be used in maintenance of electronic communication secrecy. </p>
<p>On the other hand, the presence of numerous pseudo-primes implies that a query of deciding if the given number has been composite or prime has been a complicated one. It then leads RSA again and the 2nd problem (factoring) wherein there will be a distinct approach coming from distinct angle called as the primality testing. </p>
<p>There has been a great chance that certain individuals will look forward to implementing new ideas of using modulus through a polynomial in finding the polynomial algorithm used for factoring. </p>
<p><iframe width="640" height="480" src="//www.youtube.com/embed/wXB-V_Keiu8" frameborder="0" allowfullscreen></iframe></p>
<h3>How Does Prime Numbers Cryptography Work?</h3>
<p>The encryption method has been presented with a novel property which publicly reveals the encryption key. Thus, it does not4 reveal the given decryption key. It has 2 essential consequences:</p>
<p>• Couriers or even some secure means have not required transmitting keys.<br />
• The message could be ‘signed’ with the use of decryption key that is privately held. Anybody could verity such signature with the use of corresponding encryption key that is publicly revealed. </p>
<p>The prime numbers cryptography (public key cryptography) standard security has been established on mathematical complexity of getting 2 prime factors that are larger numbers. Many encryption systems relied on the secret key that 2 or more parties had used in decrypting information which is encrypted by the typically agreed method. PKC’s main idea is the usage of 2 unique keys from every participant, having bi-directional encryption mechanism which could used to decrypt info that is encrypted with other key. </p>
]]></content:encoded>
			<wfw:commentRss>https://navajocodetalkers.org/prime-numbers-cryptography/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>History of Cryptography</title>
		<link>https://navajocodetalkers.org/history-of-cryptography/</link>
		<comments>https://navajocodetalkers.org/history-of-cryptography/#comments</comments>
		<pubDate>Wed, 16 Apr 2014 10:00:31 +0000</pubDate>
		<dc:creator><![CDATA[navajocodetalkersadmin]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>

		<guid isPermaLink="false">https://navajocodetalkers.org/?p=102</guid>
		<description><![CDATA[Cryptography has been around for some time now, and in comparison to other disciplines, it is still young. For about a hundred years now, people have used this technique to hide messages especially sensitive information. How Far Back Does Cryptography Date? Pieces of evidence throughout history have shown the use of cryptography back in the earlier times. Around 1900 BC in Egypt, Khnumhotep II’s tomb has inscriptions that used unusual hieroglyphics. Researchers claim that the inscriptions were not necessarily meant to hide sensitive information, but only to make the writings look dignified. Early civilizations also show the use of cryptography. [...]]]></description>
				<content:encoded><![CDATA[<p>Cryptography has been around for some time now, and in comparison to other disciplines, it is still young. For about a hundred years now, people have used this technique to hide messages especially sensitive information. </p>
<h3>How Far Back Does Cryptography Date?</h3>
<p>Pieces of evidence throughout history have shown the use of cryptography back in the earlier times. Around 1900 BC in Egypt, Khnumhotep II’s tomb has inscriptions that used unusual hieroglyphics. Researchers claim that the inscriptions were not necessarily meant to hide sensitive information, but only to make the writings look dignified. </p>
<p><iframe width="640" height="480" src="//www.youtube.com/embed/H9Cu36Qj3dQ" frameborder="0" allowfullscreen></iframe></p>
<p>Early civilizations also show the use of cryptography. A good example is that of the Arthshashtra which was written by Kautalya. It is about statecraft which describes espionage services in India. The writer also mentioned about spies getting assignments in codes or secret writing. </p>
<p>Julius Caesar was also noted for sending secret or encrypted messages to his generals back in 100 BC which was popularly known as ‘Caesar cipher’. For every character, there is a matching substitute cipher. The encrypted message is the cipher text that is unreadable. With the Caesar cipher, the characters were simply shifted three (3) places. For instance, the letter ‘A’ is replaced by the letter ‘D’, ‘B’ by ‘E’, ‘C’ by ‘F’, until all the letters are used. </p>
<h3>Maintaining Secrecy</h3>
<p>The system’s secrecy is very important because once it is made known to other people the encrypted messages can be easily decoded or decrypted. Therefore, only authorized people should be aware of the system and the keys. </p>
<p>It was during the 16th century when an encryption key was used to cipher plain text by Vigenere. However, it was also quite easy to decrypt. Still, he was the first person to introduce the encryption key which is being used to date. </p>
<p><iframe width="640" height="360" src="//www.youtube.com/embed/alpnKaPoUZ8" frameborder="0" allowfullscreen></iframe></p>
<p>During the 19th century, another attempt in cryptography was designed by Hebern. His work was called ‘Hebern rotor machine’ and it was basically an electro-mechanical contraption. The rotating discs embed the secret key, but due to letter frequencies, the cipher was also broken with ease. </p>
<p>After World War I, Arthur Scherbius, a German engineer invented the Enigma machine. The machine was used until World War II, and it had 3-4 rotors. Poland was able to break the cipher and British cryptographers adopted the technology to design an effective way to obtain daily keys. Until the Second World War, cryptography was used mainly by the military.</p>
<p>By 1970, IBM created the crypto group which designed ‘Lucifer’. The NIST, formerly known as National Bureau of Standards, accepted the Lucifer and changed its name to Data Encryption Standard or DES. A comprehensive search attack was able to break the DES. After this, NIST searched for another block cipher and it accepted Rijndael in the year 2000. The cipher was called Advanced Encryption Standard or AES.</p>
<p>Until today, cryptographers follow the Kerckhoff’s Principle which believes that the message’s secrecy should depend on the key’s secrecy and not that of the encryption system. It is always best to use ciphers that are accepted as a standard and are reviewed publicly. Now that you know a bit of the history of cryptography, you will be able to appreciate its worth regardless of the industry that you belong. </p>
]]></content:encoded>
			<wfw:commentRss>https://navajocodetalkers.org/history-of-cryptography/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What Is Cryptography</title>
		<link>https://navajocodetalkers.org/what-is-cryptography/</link>
		<comments>https://navajocodetalkers.org/what-is-cryptography/#comments</comments>
		<pubDate>Fri, 11 Apr 2014 10:00:34 +0000</pubDate>
		<dc:creator><![CDATA[navajocodetalkersadmin]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>

		<guid isPermaLink="false">https://navajocodetalkers.org/?p=99</guid>
		<description><![CDATA[A lot of people think that cryptography started when computers were invented. Well, even before the age of computers, this technique or discipline has already been in existence. Cryptography Defined By definition, cryptography is about protecting the secrecy and integrity of messages. Today, electronic messages are the ones that require this technique. What happens is that the electronic messages are converted into cipher form or unreadable texts. In order to make the text readable or clear, a key or software is used that employs algorithms or mathematical formulas. Today’s modern techniques are considered virtually unbreakable, so if certain information needs [...]]]></description>
				<content:encoded><![CDATA[<p>A lot of people think that cryptography started when computers were invented. Well, even before the age of computers, this technique or discipline has already been in existence. </p>
<h3>Cryptography Defined</h3>
<p>By definition, cryptography is about protecting the secrecy and integrity of messages. Today, electronic messages are the ones that require this technique. What happens is that the electronic messages are converted into cipher form or unreadable texts. In order to make the text readable or clear, a key or software is used that employs algorithms or mathematical formulas. </p>
<p><iframe width="640" height="360" src="//www.youtube.com/embed/fNC3jCCGJ0o" frameborder="0" allowfullscreen></iframe></p>
<p>Today’s modern techniques are considered virtually unbreakable, so if certain information needs to be protected, cryptography will play an important role. Encrypting readable texts into cipher texts is not that hard, but if you don’t know the key, it would be impossible to make the text readable. Only through code-breaking or cryptanalysis can these encrypted messages be transformed into clear texts. </p>
<p>With the increasing popularity of computers, tabs, and other similar gadgets, the need for cryptography has also increased. Strong encryption requires knowledge of advanced mathematics. This discipline can also include digital signatures and authentication. </p>
<h3>Encryption Categories</h3>
<p>In terms of computer encryption, there are two categories:</p>
<p>• Symmetric<br />
• Asymmetric </p>
<p>The first category is also known as single-key encryption. This means that there is only one key to encrypt an electronic message and to decrypt it. The opposite is the second category which is also referred to as public key. In the asymmetric encryption, two keys are used instead of one – the public and private keys. </p>
<p><iframe width="640" height="360" src="//www.youtube.com/embed/cRiMb5q2VVk" frameborder="0" allowfullscreen></iframe></p>
<h3>Benefits of Cryptography</h3>
<p>There are times when you need to deal with sensitive information. In this case, you will surely benefit from cryptography. One way to prevent leakage of secret or confidential information is by converting the text into cipher form. Only when the information is deciphered can another person use it.</p>
<p>Though the internet offers a lot of opportunities, safety is not always guaranteed. Even if cryptography is not always 100%, it is one of the best ways to secure vital pieces of information. Now, you can shop online or surf the web without worrying about other parties intercepting valuable information. </p>
<p>A lot of hackers and cybercriminals are now looking for potential victims. If you don’t use cryptography, you are putting sensitive information at risk. For instance, an original message can be altered when it is being sent online. Hackers will only need to access the message and change the meeting through the use of special software or programs.</p>
<h3>How Cryptography Works</h3>
<p>The process is quite simple. Firstly, the sender will convert the text to unreadable format (cipher). When the recipient gets the information, he or she will need to decrypt the information so that it can be returned to its plain or original format. To carry out cryptography, there are elements at play and this includes plain text or info, encryption key, and the encryption algorithm. With these elements, anyone can handle cryptography</p>
<p>With this little knowledge, you can now enjoy surfing the web, doing some online shopping, and other activities that require the use of valuable information. </p>
]]></content:encoded>
			<wfw:commentRss>https://navajocodetalkers.org/what-is-cryptography/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
