New Mexico Supercomputing Challenge | |||||||||||
|
|||||||||||
|
In our modern era, technology plays a key role in our lives. With the
exponential growth in the processing power of computers, so has our utility
of them expanded to levels not previously seen. Along with the advantages
and convenience that comes with technology, there also comes a tendency
to grow dependent upon the benefits. With all of the technological crutches
we have created, our security has been compromised in the process. As the
future of e-commerce expands, we need to broaden our approaches in security
to ensure that our personal information and bank account numbers stay that
way- personal. This can be accomplished by cryptography, among other things.
Cryptography can be described as the art and science of transforming information
into an intermediate form, which secures that information while in storage
or in transit. This includes the confidentiality of your data, and
message authentication or integrity of your data. Cryptography may also
include nonrepudation, which is the inability to deny sending a message;
user or source authentication; and the availability of security options
for the general public. Modern methods of cryptography generally translate
data into one of an astronomical number of immediate representations, which
are called collectively the key. The translated message is called ciphertext.
Let's say Jane wanted to set up secret communication with Paul, but did
not want sly 'man-in-the-middle' to have the ability to apprehend and/or
understand any of the messages. With cryptography, Jane can make her communications
unintelligible, even when in plain sight. First off, Jane and Paul need
to meet and agree on a key in which to encipher (translate) their messages.
Now, if they were able to send their secret key over the network securely,
then in theory they can send any data securely via that route. However,
this leaves their data open and vulnerable to attack. So, Jane comes up
with a key, gives it to Paul, and they start writing to each other, encrypting
and decrypting as they send and receive data. This is called a symmetric
crypto system. It is symmetric because the key to encrypt is the same as
the key to decrypt. In an asymmetric cryptosystem, the key to encrypt
is different from the one used to decrypt. This type of system is called
the Public-Key system. It is named public key because the encryption key
can be made public. Any Joe can get a copy of the public key to encrypt
and send messages, but only the person holding the corresponding decrypting
key can decrypt the data.
Team Members Sponsoring Teachers Project Advisor(s)
Los Alamos National Laboratory Sandia National Labs |