answersLogoWhite

0


Best Answer

Without going into the fact the Cryptography has been used in some form or another for many hundreds, if not thousands of years, it's benefits when it comes to computers really come into their own. I will give some examples.

Cryptography allows us to hide information. Be it a letter, be it a file, be it a constant stream of video or audio over digital sources. Now computers are good at only one thing it's manipulating and processing truly staggering amounts of data and information of many kinds in a short period of time. Information that would take humans to work though many, many times longer.

There for the basis of breaking encryption becomes much easier with computers and logical/Turing machines which are constructed to apply mathematical force to a cytological methods until it finds the key. Normally it would take a bunch of people working on paper and pencil a insanely long time due to the complexity of modern cryto-methodology. So much so it's just not remotely feasible without some kind of computer. In fact, computer technology as we know it today is largely based on the work of men who created them as tools to, in fact, try and break codes during World War II.

So since computers make breaking codes much easier it therefore becomes necessary to use stronger and stronger methods of encryption and increasingly more complex keys. This has been a constant war for some time between those who built crypto-systems and those who break codes.

Since most of the data in the world these days flows over computers on either public or private network connection ranging from local to global it becomes necessary to have a strong, reliable encryption methods for your data because it's laughably easy for some one to just sniff packets off a network and read all the data you happen to be sending if it's not encrypted. So Crypto-systems are needed in order to maintain data secrecy (for Governments, Companies protecting intellectual property, individuals who seek private communication and yes, even criminals who seek to keep their data safe from the authorities) for the people in question.

The benefits could be compared to either pulling some one aside to speak to them privately (encrypted) or shouting the information across a crowded room (unencrypted). It all depends on your need for security and privacy.

This is a complex subject, but basically encrypting data if done correctly allows me to hide what I am saying to my friend/co-worker/boss from those I might not want to read my mail/conversations/files.

Hope that helps!

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the Benefits of Cryptography in computer Security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What has the author Florian Baur written?

Florian Baur has written: 'Kryptologische Verfahren' -- subject(s): Security measures, Computer security, Cryptography, Internet


Why cryptography is needed in internet security?

to provide the security for data


Why is a computer system required to pay social security benefits?

A computer system is faster and more effective when used to pay the social security benefits.


What is a cryptolgist?

The study of cryptanalysis or cryptography. Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce


Cryptography In terms of encryption and decryption?

In cryptography the message is encrypted by the sender and decrypted by the reciver. so, it ensures message security.


What has the author Bruce Schneier written?

Bruce Schneier has written: 'Schneier on security' -- subject(s): Computer networks, Computer security, Prevention, Privacy, Right of, Right of Privacy, Security measures, Terrorism 'The Twofish Encryption Algorithm' 'Applied Cryptography' -- subject(s): Security measures, Telecommunication, Computer security, Cryptography 'Liars and outliers' -- subject(s): Interpersonal relations, Sociology, Social stability, Social aspects, Trust, Social interaction, Truthfulness and falsehood 'Protect Your Macintosh' 'Beyond fear' -- subject(s): Terrorism, Prevention, War on Terrorism, 2001-, War on Terrorism, 2001-2009


What has the author Peter Wayner written?

Peter Wayner has written: 'Disappearing cryptography' -- subject(s): Computer networks, Security measures, Cryptography, Internet 'Java Beans for real programmers' -- subject(s): Java (Computer program language), JavaBeans 'Agents unleased' -- subject(s): Computer software 'Java and JavaScript programming' -- subject(s): Java (Computer program language), JavaScript (Computer program language)


What has the author Kamol Lek written?

Kamol Lek has written: 'Cryptography' -- subject(s): Data encryption (Computer science), Cryptography


Q. What is cryptography in Cyber Security?

Ans:-Cryptography aids to secure information from third parties. It allows only the sender and the receiver to access the data securely Cryptography is Leading the Mase for all Our Security it has become more crcuial we have protact personal data using of digital signatures more depth information in cryptography more about Cyber Securities securiumsolution provided training and internship


What is cryptovirology?

It is the area that employs public key cryptography to mount attacks on computer systems, showing that cryptography has also "negative" usage. It started in a 96 paper by Young and Yung in IEEE Security and Privacy. Ransomeware employed in actual attacks on systems that do not have recent backups is an instance of this area of study.


What has the author Jonathan Knudsen written?

Jonathan Knudsen has written: 'Wireless Java' 'Java cryptography' -- subject(s): Java (Computer program language), Cryptography, Data encryption (Computer science)


What is the role of cryptography in information security?

While the term security arises the cryptography or cryptology always comes at the top of the list on the topic of security of any system, device and whatever else. The technique of transforming and storing information or in the ease of communication between two parties cryptography helps to connect, store and transform with security.