answersLogoWhite

0


Best Answer

Cryptography is a means of encrypting or obscuring information.

It is related to computers mainly by the internet. When data is passed between a client and a server it can be encrypted so that only the desired recipient can decrypt the data and read it, preventing eaves dropping or interception of the data because the eaves dropper will not be able to decrypt the data (not easily anyway).

It can also be used when storing data on a computer - thereby preventing anyone decrypting the data and viewing it.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is cryptography and how is it related to computers?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

How asymmetric cryptography both requires and support the use of symmetric cryptography?

Lmfao - do Richard kays coursework by yourself instead of asking others to answer it for you.


What is java cryptography architecture?

The Java Cryptography Architecture (JCA) is a framework for working with cryptography using the Java programming language. It forms part of the Java security API, and was first introduced in JDK 1.1 in the java.security package.http://en.wikipedia.org/wiki/Java_Cryptography_Architecture


What are the different cryptography algorithms?

There are many different algorithms used in cryptography - RSA, DES and Rabine ciphers are a few that can be used - as well as others that are used to help determine the constants in a system like Euclid's algorithm.


What is grace Murray hopper known for?

She was one of the first programmers of one of the first computers. See the related link for more information.


What are the disadvantage of rsa algorithm?

A disadvantage of using public-key cryptography for encryption is speed. There are many secret-key encryption methods that are significantly faster than any currently available public-key encryption method. Nevertheless, public-key cryptography can be used with secret-key cryptography to get the best of both worlds. For encryption, the best solution is to combine public- and secret-key systems in order to get both the security advantages of public-key systems and the speed advantages of secret-key systems. Such a protocol is called a digital envelope, which is explained in more detail in Question 2.2.4.Public-key cryptography may be vulnerable to impersonation, even if users' private keys are not available. A successful attack on a certification authority (see Question 4.1.3.14) will allow an adversary to impersonate whomever he or she chooses by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user.In some situations, public-key cryptography is not necessary and secret-key cryptography alone is sufficient. These include environments where secure secret key distribution can take place, for example, by users meeting in private. It also includes environments where a single authority knows and manages all the keys, for example, a closed banking system. Since the authority knows everyone's keys already, there is not much advantage for some to be "public" and others to be "private." Note, however, that such a system may become impractical if the number of users becomes large; there are not necessarily any such limitations in a public-key system.Public-key cryptography is usually not necessary in a single-user environment. For example, if you want to keep your personal files encrypted, you can do so with any secret key encryption algorithm using, say, your personal password as the secret key. In general, public-key cryptography is best suited for an open multi-user environment.Public-key cryptography is not meant to replace secret-key cryptography, but rather to supplement it, to make it more secure. The first use of public-key techniques was for secure key establishment in a secret-key system [DH76]; this is still one of its primary functions. Secret-key cryptography remains extremely important and is the subject of much ongoing study and research. Some secret-key cryptosystems are discussed in the sections on block ciphers and stream ciphers.

Related questions

Why are computers used in cryptography?

Computers can reach much higher levels of cryptography than the human brain can process. There are cryptographic formulas that a computer can solve in seconds that a human could take decades to solve.


What does DH-ECC stand for in computers?

Diffie-Hellman Elliptical Curve Cryptography


How is cryptography related to math?

Cryptography is the study of hiding information using mathematical algorithms in such a way that the original information cannot be assertained from the resulting 'cyphercode' without knowledge of the specific 'key' required to undo the changes made by the algorithm.The algorithms used in cryptography are related to math, being mathematically founded, and so, by extension, cryptography is related to math.


Where is cryptography used?

Banks use it to protect their clients' details; military and government organisations use it to keep important information secret.


What are the types of cryptography?

public key cryptography private key cryptography


What are different cryptography algorithms?

There are two types of cryptography algorithms: 1) Public key cryptography 2) Secret key cryptography


What the the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What are the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What is cryptography and sequrity?

Cryptography is a technique for secure transmission of messages.


When was Cryptography Research created?

Cryptography Research was created in 1995.


What is Cryptography Research's population?

Cryptography Research's population is 25.


What prompted further development of computers?

Originally it was military uses, as well a nuclear weapon design and cryptography. Now it is nuclear weapon stockpile stewardship and gaming.