##
__What is Cryptography?__

What is Cryptography |

**is a Technique for Secure our data or Communication in the Presence of third Parties Attack. The term**

__Cryptography__**cryptography**means "secret writing".

**Cryptographer**refers to secure information & communication technique derived from a set of rule-based calculation called algorithms, to transfer a plain text into ciphertext.

**Cryptography**not only protects data from theft or alteration but can also, be used for user authentication.

**Cryptography**involves the process of encryption and decryption. The information cannot be read without a key to decrypt it.

If You Read About What is Threats? Click On Link and Read Out.

###
__The Terms used in Cryptography –__

The original message or data that is fed into the algorithm as input is called plaintext.__Plain Text -__Ciphertext is the encrypted form of a message. It is the scrambled message produced as output.__Cipher Text –__A key is a number or a set of numbers that the algorithm uses to perform encryption and decryption.__Key –__

###
__Encryption Algorithm and Decryption
Algorithm__

__Encryption Algorithm and Decryption Algorithm__

## Encryption Algorithm and Decryption Algorithm |

__Encryption Algorithm:__- To Create a cipher-text from Plain Text.
- Public shared Symmetric Key is used in Symmetric/secret technique.
- The public key is used in an asymmetric technique for encryption.
- It produces cipher-text as output.

__Decryption Algorithm:__- To Create a plain-text from the cipher text
- Public shared symmetric key is used in symmetric/secret technique.
- Hereafter the private key is used in asymmetric techniques for decryption.
- It Produces plain text as output

If You Don't Know About Firewall? & Hows its Work? Click On Link & Read Out

###
__Modern cryptography concerns itself
with the following four objectives:__

__Modern cryptography concerns itself with the following four objectives:__

__Confidentiality__the information cannot be understood by anyone for whom it was unintended.__:__It making sure that the data stays accurate and consistent between sender and intended receiver without the alteration being detected.__Integrity:__the creator/sender of the information cannot deny the authenticity of their signature over their document or the sending of a message.__Non-repudiation:__is the process of making sure that the piece of data being claimed by the user belongs to it.__Authentication:__

###
__There are various types of
algorithms for Cryptography:-__

__There are various types of algorithms for Cryptography:-__

- Symmetric-key cryptography
- Hash functions.
- Public-key cryptography

__Symmetric-Key Cryptography (SKC)__

Symmetric Key Encryption |

- In this type of Cryptography, only one key is used for both encryption and decryption techniques. (Only Public Key) The sender uses this key to encrypt the plaintext and send the ciphertext to the receiver. On the other side, the receiver applies the same key to decrypt the message into Plain Text.

- It is also called Symmetric Encryption technique.

If You Don't Know About IDS? Click On Link & Read Out.

__Public Key Cryptography (PKC)__

Asymmetric Key Encryption |

- In this type of Cryptography, two keys are used for encryption and decryption techniques. One is Public and another is Private. The sender encrypts the information using the receiver’s public key. The receiver decrypts the message using his/her private key.

- It is also called AsymmetricEncryption Technique.

__Hash Functions__

No key is used in this algorithm. A fixed length of the hash value is
generated through plain text and makes it impossible for the contents of the
plain text to be recovered.

## 0 Comments