Question

Cryptography is used by just about everyone on the Internet every day. It is used to...

Cryptography is used by just about everyone on the Internet every day. It is used to keep some of the most sensitive information private. It can be used by criminals to orchestrate their crimes. Do you think encryption mechanisms should have some type of "backdoor" to allow authorities access to data? If so, what should those mechanisms be? You may need to do some research on this topic to address all aspects of it. Discuss your position on this and support it with outside sources

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

Cryptography is the art of secret writing. In cryptography, the plain text is converted into non-human readable cipher text. There are 2 processes in cryptography such as encryption and decryption. Encryption means converting plain text to cipher text and decryption means converting the cipher text back to human readable and meaningful plain text. To make a message or content secure we apply cryptographic algorithms so that the message cannot be read or meaning cannot be understood by persons for which it is not meant to. Only authorized persons will have the means of decrypting the cipher text back to plain text so that they can understand the meaning of it. When sending through an unsecured medium of transmission such as the internet cryptographic algorithms are used to secure the transfer of messages from the source to the destination.

We know thus that Cryptography is used by just about everyone on the Internet every day as it is absolutely necessary for the security of the messages transmitted. It can also be used by the criminals to orchestrate their crimes. So, should Encryption mechanisms have some type of "backdoor" to allow authorities access to data? Yes and No. Depends on the objective. If we want better security, then such kind of backdoors should not exists in the application to allow the access to data, as such kind of backdoor can be unethically be used to read messages transmitted without being authorized to do so. Thus these kind of backdoors should not be used as it will not make the application or encryption full-proof on implementation of the backdoors. Yes, if we are ready to use the backdoor for monitoring purposes and for the use of emergencies to help catch criminals and so, so that where criminals orchestrate their crimes, it can help the law enforcement to catch them and intercept their transmissions.

We can have some type of "backdoor" to allow authorities access to data by using mechanisms such as programmatically having a specialized private key to decrypt the message and use it as a key for all the messages being transmitted. Thus, modifying the encryption method in our favor, we can have a key which decrypts the transmission allowing the authorities access to data. Also, in another method, the backdoor will be a method which can be used to obtain the plain text before even the cryptography takes place, thus revealing the secret text.

Add a comment
Know the answer?
Add Answer to:
Cryptography is used by just about everyone on the Internet every day. It is used to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Cryptography is one of the most fundamental aspects of cyber-security. As we've seen, encryption and hashing...

    Cryptography is one of the most fundamental aspects of cyber-security. As we've seen, encryption and hashing are pervasive throughout computing. There are techniques such as SSL used to encrypt "data in transit" (data which is actively being sent over the network) and there are technologies that can be employed on your end devices to encrypt "data at rest" (data which is stored on a device or server). Recently, there has been some controversy over encryption. Once available primarily to the...

  • Advancements in medicine has allowed for amazing enhancements to the male and female reproductive system. Some...

    Advancements in medicine has allowed for amazing enhancements to the male and female reproductive system. Some of these advancements have been life altering and changing for many individuals. Do some research using the internet, your textbook, and other sources and discuss some of these new advancements. Include what the advancement or discovery is, how is it performed or used, and what benefits it may have to the individual? Caution, this discussion can become a sensitive topic for some individuals. A...

  • Should access to healthy food be a right for everyone? Obesity screening is an important secondary...

    Should access to healthy food be a right for everyone? Obesity screening is an important secondary prevention measure. Nutritional intake is influenced by many factors such as cultural, social, economic and regulatory to name a few. Address healthy eating. Consider some of the points below and any other points that you feel are important to the discussion. What if healthy food was only available to people who can afford it? What might be the consequences of that—both to individuals and...

  • Can anyone pick one and give me an example? This Internet assignment consists of four choices. Choose two of the four ch...

    Can anyone pick one and give me an example? This Internet assignment consists of four choices. Choose two of the four choices that you would like to learn more about. Each chosen part of this Internet assignment is worth a possible 20 points. So, the Internet assignment is worth a total of 40 possible points (20 points for each choice you have selected and written about). Your response to each chosen assignment should be a minimum of 10 complete sentences. 

...

  • OPTION #1: Assist in creating a Proposal: ......... XYZ Corporation XYZ Corporation is a small organization of roughly 2...

    OPTION #1: Assist in creating a Proposal: ......... XYZ Corporation XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals). In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a...

  • Does Technology Create a Divide between the More and Less Fortunate? A teacher assigns a research...

    Does Technology Create a Divide between the More and Less Fortunate? A teacher assigns a research paper that requires students to read several articles on the web. A school requires that all students type papers on a computer and submit the papers using email. While these may be valid ways to integrate technology in a curriculum or to help instructors manage their classroom, they assume all students have ample access to technology outside of school. School districts that assume all...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • Discuss your response to these questions. Do you think the Internet should be regulated? If so...

    Discuss your response to these questions. Do you think the Internet should be regulated? If so why and by whom? What aspect of the Internet should be regulated? What are the implications of regulating / not regulating? For the first time, organizations can apply for an Internet address all their own, marking the start of a new era in the growth of the Internet. For example, .com and .org could be replaced by .starbucks or .newyork. The expansion was planned...

  • Overview This assignment will give you experience on the use of classes. Understand the Application Every...

    Overview This assignment will give you experience on the use of classes. Understand the Application Every internet user–perhaps better thought of as an Internet connection–has certain data associated with him/her/it. We will oversimplify this by symbolizing such data with only two fields: a name ("Aristotle") and a globally accessible IP address ("139.12.85.191"). We could enhance these by adding other—sometimes optional, sometimes needed—data (such as a MAC address, port, local IP address, gateway, etc), but we keep things simple and use...

  • Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set...

    Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure the RMC network and ensure that the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT