Cryptography is a technique of securing information and communications through the use of codes so that only those persons for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graph means “writing”.
Cryptography is a technique that is used to protect information are obtained from mathematical concepts and a set of rule-based calculations known as algorithms to convert messages in ways that make it hard to decode them. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet, and protect confidential transactions such as credit card and debit card transactions.
Main Key Features of Cryptography In Cyber Security
- Confidentiality: Information can only be accessed by the person for whom it is intended and no other person except him can access it.
- Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected.
- Non-repudiation: The creator/sender of information cannot deny his or her intention to send information at later stage.
- Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of the information is confirmed.
Types of Cryptography
In general, there are three types Of cryptography:
- Symmetric Key Cryptography: It is an encryption system where the sender and receiver of a message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric-key cryptography system is Data Encryption System(DES).
- Hash Functions: There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.
- Asymmetric Key Cryptography: Under this system, a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. The public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.
Watch Video Tutorial of Cryptography in Cyber Security
Conclusion
Cryptography is the study of securing communications from outside observers. Encryption algorithms take the original message, or plaintext, and convert it into ciphertext, which is not understandable. The key allows the user to decrypt the message, thus ensuring on they can read the message. The strength of the randomness of an encryption is also studied, which makes it harder for anyone to guess the key or input of the algorithm.
Comments
Post a Comment