Bcj245 q4
1
BCJ245 – Computer Forensics And Cyber Crime
Name
Institution
Course
Instructor
Date
2
BCJ245 – Computer Forensics And Cyber Crime
Question 4: Describe the technology of encryption, why and how it is used, and
concerns/tensions around its use.
For this definition, encryption is the technique for encoding messages or files such that
they can only be decoded and read by a limited number of persons. For the uninitiated,
encryption is scrambling (encrypting) data and then using a key to unscramble (or decode) it
so that the intended receiver may read the information. The plaintext is the message that is
transferred unencrypted inside an encrypted transmission, and it is also known as clear text.
Crypt text is the term used to describe anything that has been encrypted and rendered
unreadable (Grabosky, 2000). According to experts, simply rearranging letters between two
phrases may be sufficient for certain primitive kinds of encryption. Cryptographers have been
adding new approaches to the mix to keep up with advancements in encryption technology,
increasing the difficulty of decryption. Combining wheels and gears would be impossible to
develop complicated encryption methods. In most circumstances, mechanical encryption has
been mostly superseded by cryptographic algorithms developed by computers (Grabosky,
2000). Encryption is encrypting your data using algorithms to protect it from prying eyes.
Afterward, it is sent to the recipient, who will be able to decrypt it with the help of a secret key
provided. Using a specific method for scrambling and decrypting data, each kind of algorithm
differs from the others, and each algorithm is identifiable by the technique it utilizes. It is
standard practice to use random number generators or computer algorithms designed to
resemble random number generators to create key combinations (Grabosky, 2000). When
computers create keys, they may use the user’s mouse movement to generate one-of-a-kind
seeds. A more sophisticated method of generating keys is used in this case. A unique key is
produced for each session and used to identify the session to add a degree of security to existing
systems that allow forward secrecy.
3
Reference
Grabosky, P. (2000, April). Computer crime: A criminological overview. In Workshop on
Crimes Related to the Computer Network, 10th United Nations Congress on the
Prevention of Crime and the Treatment of Offenders. Vienna.
Name:
Description:
…