Cryptography

how can cryptographic technologies address the business needs of the military?

Col. Ekson has given you the responsibility of preparing a report on the implementation of e commerce and secure communication technologies to address the military’s stated business needs. Your report should include the following:

  • how these cryptographic techniques and algorithms can be used
  • how to choose pseudo random keys that suffice for cryptographic applications
  • how to crack the code or key of an adversary who is using these technologies

Your answer should be no more than a page long.