Cryptography
Cryptography
What is Cryptography?
Cryptography Techniques
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes
techniques such as microdots, merging words with images and other ways to hide information
in storage or transit. However, in today's computer-centric world, cryptography is most often
associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext)
into ciphertext (a process called encryption), then back again (known as decryption). Individuals
who practice this field are known as cryptographers.
Cryptographic Algorithms
A cipher suite uses one algorithm for encryption, another algorithm for message authentication
and another for key exchange. This process, embedded in protocols and written in software
that runs on operating systems (OSes) and networked computer systems, involves:
In June 2003, AES was approved by the U.S. government for classified information. It is a
royalty-free specification implemented in software and hardware worldwide. AES is the
successor to the Data Encryption Standard (DES) and DES3. It uses longer key lengths -- 128-bit,
192-bit, 256-bit -- to prevent brute force and other attacks.
It focuses on a similar key for encryption as well as decryption. Most importantly, the
symmetric key encryption method is also applicable to secure website connections or
encryption of data. It is also referred to as secret-key cryptography. The only problem is that
the sender and receiver exchange keys in a secure manner. The popular symmetric-key
cryptography system is Data Encryption System (DES). The cryptographic algorithm utilizes the
key in a cipher to encrypt the data and the data must be accessed. A person entrusted with the
secret key can decrypt the data. Examples: AES, DES, etc.
Features:
This cryptographic method uses different keys for the encryption and decryption process. This
encryption method uses public and private key methods. This public key method helps
completely unknown parties to share information between them like email id. private key helps
to decrypt the messages and it also helps in the verification of the digital signature. The
mathematical relation between the keys is that the private key cannot be derived from the
private key. Example: ECC, DSS, etc.
Features:
Cryptography Concerns
Attackers can bypass cryptography, hack into computers that are responsible for data
encryption and decryption, and exploit weak implementations, such as the use of default keys.
However, cryptography makes it harder for attackers to access messages and data protected by
encryption algorithms.
Growing concerns about the processing power of quantum computing to break current
cryptography encryption standards led NIST to put out a call for papers among the
mathematical and science community in 2016 for new public key cryptography standards.
Unlike today's computer systems, quantum computing uses quantum bits (qubits) that can
represent both 0s and 1s, and therefore perform two calculations at once. While a large-scale
quantum computer may not be built in the next decade, the existing infrastructure requires
standardization of publicly known and understood algorithms that offer a secure approach,
according to NIST. The deadline for submissions was in November 2017, analysis of the
proposals is expected to take three to five years.
There are a huge number of benefits of cryptography in blockchain some of them are stated
below—
Limitations of Cryptography