What is Cryptography?
![]() |
What is Cryptography |
Cryptography is a Technique for Secure our data or
Communication in the Presence of third Parties Attack. The term cryptography means "secret writing".
Cryptographer refers to secure information &
communication technique derived from a set of rule-based calculation called
algorithms, to transfer a plain text into ciphertext.
Cryptography not only protects data from theft or alteration but can
also, be used for user authentication.
Cryptography involves the process
of encryption and decryption. The information cannot be read
without a key to decrypt it.
If You Read About What is Threats? Click On Link and Read Out.
The Terms used in Cryptography –
- Plain Text - The original message or data that is fed into the algorithm as input is called plaintext.
- Cipher Text – Ciphertext is the encrypted form of a message. It is the scrambled message produced as output.
- Key – A key is a number or a set of numbers that the algorithm uses to perform encryption and decryption.
Encryption Algorithm and Decryption Algorithm
![]() |
Encryption Algorithm and Decryption Algorithm |
Encryption Algorithm:
- To Create a cipher-text from Plain Text.
- Public shared Symmetric Key is used in Symmetric/secret technique.
- The public key is used in asymmetric the technique for encryption.
- It produces cipher-text as output.
Decryption Algorithm:
- To Create a plain-text from the cipher text
- Public shared symmetric key is used in symmetric/secret technique.
- Hereafter the private key is used in asymmetric techniques for decryption.
- It Produces plain text as output
If You Don't Know About Firewall? & Hows its Work? Click On Link & Read Out
Modern cryptography concerns itself with the following four objectives:
- Confidentiality: the information cannot be understood by anyone for whom it was unintended.
- Integrity: It making sure that the data stays accurate and consistent between sender and intended receiver without the alteration being detected.
- Non-repudiation: the creator/sender of the information cannot deny the authenticity of their signature over their document or the sending of a message.
- Authentication: is the process of making sure that the piece of data being claimed by the user belongs to it.
There are various types of algorithms for Cryptography:-
- Symmetric-key cryptography
- Hash functions.
- Public-key cryptography
Symmetric-Key Cryptography (SKC)
![]() |
Symmetric Key Encryption |
- In this type of Cryptography, only one key is used for both encryption and decryption techniques. (Only Public Key) The sender uses this key to encrypt the plaintext and send the ciphertext to the receiver. On the other side, the receiver applies the same key to decrypt the message into Plain Text.
- It is also called Symmetric Encryption technique.
If You Don't Know About IDS? Click On Link & Read Out.
Public Key Cryptography (PKC)
![]() |
Asymmetric Key Encryption |
- This type of Cryptography two keys is used for encryption and decryption techniques. One is Public and another is Private. The sender encrypts the information using the receiver’s public key. The receiver decrypts the message using his/her private key.
- It is also called AsymmetricEncryption Technique.
Hash Functions
No key is used in this algorithm. A fixed length of the hash value is
generated through plain text and makes it impossible for the contents of the
plain text to be recovered.
No comments:
Post a Comment