What is Cryptography & Types of Cryptography algorithms?

What is Cryptography?

what is cryptography,cryptography,cryptography basics,cryptography tutorial,what is cryptography in hindi,what is encryption,introduction to cryptography,cryptography and network security,cryptography examples,cryptography (software genre),what is decryption,what is cryptography pdf,cryptography in hindi,what is cryptography 15 min,what is cryptography detail,cryptography explained,cryptography techniques
What is Cryptography

Cryptography is a Technique for Secure our data or Communication in the Presence of third Parties Attack. The term cryptography means "secret writing".

Cryptographer refers to secure information & communication technique derived from a set of rule-based calculation called algorithms, to transfer a plain text into ciphertext. 

Cryptography not only protects data from theft or alteration but can also, be used for user authentication.

Cryptography involves the process of encryption and decryption. The information cannot be read without a key to decrypt it.
If You Read About What is Threats? Click On Link and Read Out.

The Terms used in Cryptography –

  • Plain Text - The original message or data that is fed into the algorithm as input is called plaintext.
  • Cipher Text Ciphertext is the encrypted form of a message. It is the scrambled message produced as output.
  • Key –  A key is a number or a set of numbers that the algorithm uses to perform encryption and decryption.

Encryption Algorithm and Decryption Algorithm

encryption,encryption meaning,encryption techniques,encryption and decryption techniques,encryption algorithm,encryption software,encryption methods,encryption types,encryption and decryption software,

Encryption Algorithm and Decryption Algorithm

Encryption Algorithm:
  • To Create a cipher-text from Plain Text.
  • Public shared Symmetric Key is used in Symmetric/secret technique.
  • The public key is used in an asymmetric technique for encryption.
  • It produces cipher-text as output.

Decryption Algorithm:
  • To Create a plain-text from the cipher text
  • Public shared symmetric key is used in symmetric/secret technique.
  • Hereafter the private key is used in asymmetric techniques for decryption.
  • It Produces plain text as output
If You Don't Know About Firewall? & Hows its Work? Click On Link & Read Out

Modern cryptography concerns itself with the following four objectives:

  • Confidentiality: the information cannot be understood by anyone for whom it was unintended.
  • Integrity: It making sure that the data stays accurate and consistent between sender and intended receiver without the alteration being detected.
  • Non-repudiation: the creator/sender of the information cannot deny the authenticity of their signature over their document or the sending of a message.
  • Authentication: is the process of making sure that the piece of data being claimed by the user belongs to it.

There are various types of algorithms for Cryptography:-

  • Symmetric-key cryptography
  • Hash functions.
  • Public-key cryptography

Symmetric-Key Cryptography (SKC)

symmetric key,encryption,symmetric key cryptography,symmetric encryption,symmetric,symmetric and asymmetric key cryptography,public key cryptography,private key,public key encryption,symmetric key encryption,asymmetric key,symmetrick key encryption,asymmetric key encryption,asymmetrick key encryption,asymmetric,decryption,public key,asymmetric key algorithm,key,symmetric vs asymmetric encryption,assymetric encryption
Symmetric Key Encryption

  • In this type of Cryptography, only one key is used for both encryption and decryption techniques. (Only Public Key) The sender uses this key to encrypt the plaintext and send the ciphertext to the receiver. On the other side, the receiver applies the same key to decrypt the message into Plain Text.
  • It is also called Symmetric Encryption technique.
If You Don't Know About IDS? Click On Link & Read Out.

Public Key Cryptography (PKC)

encryption,symmetric key,asymmetric key encryption,symmetric encryption,asymmetric,public key encryption,public key cryptography,public key,asymmetric key,asymmetric cryptography,symmetric,symmetric key encryption,public key encryption explained,private key,key exchange,symmetric vs asymmetric encryption,symmetric and asymmetric encryption example,asymmetric encryption,asymmetrical encryption,assymetric encryption,what is encryption
Asymmetric Key Encryption 

  • In this type of Cryptography, two keys are used for encryption and decryption techniques. One is Public and another is Private. The sender encrypts the information using the receiver’s public key. The receiver decrypts the message using his/her private key.
  • It is also called AsymmetricEncryption Technique.

Hash Functions

No key is used in this algorithmA fixed length of the hash value is generated through plain text and makes it impossible for the contents of the plain text to be recovered.

Post a Comment