0% found this document useful (0 votes)
18 views5 pages

Cryptography Simply Explained

Cryptography is the art of secret writing through encrypting sensitive data using codes and algorithms to make it unreadable by third parties except the sender and receiver. There are three main types of cryptography: symmetric key cryptography which uses a single secret key for encryption and decryption; asymmetric key cryptography which uses separate public and private keys; and hashing which creates a fixed-length encrypted version of a message without a secret key. Modern cryptography provides four primary functions: authentication to confirm a message's validity; confidentiality to secure data from third parties; integrity to prevent tampering; and non-repudiation so a sender cannot deny ownership of information.

Uploaded by

Realaleeyou Tv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

Cryptography Simply Explained

Cryptography is the art of secret writing through encrypting sensitive data using codes and algorithms to make it unreadable by third parties except the sender and receiver. There are three main types of cryptography: symmetric key cryptography which uses a single secret key for encryption and decryption; asymmetric key cryptography which uses separate public and private keys; and hashing which creates a fixed-length encrypted version of a message without a secret key. Modern cryptography provides four primary functions: authentication to confirm a message's validity; confidentiality to secure data from third parties; integrity to prevent tampering; and non-repudiation so a sender cannot deny ownership of information.

Uploaded by

Realaleeyou Tv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cryptography Simply Explained

by
Crypto VIP Signal

Telegram Channel: https://t.me/CryptoVIPSignalTA

Twitter: https://twitter.com/Crptovipsignal

Contact Admin: https://t.me/jamess141

What is Cryptography?
Cryptography is the art of secret writing by encrypting sensitive information using
codes and algorithms.

The main goal of cryptography is to make sensitive data not readable by third
parties. Only the sender and receiver can read or understand that data.

In cryptography, crypt means "hidden" and graphy stands for "writing" which
shows the cryptography meaning as hidden writing.
Types of Cryptography

Cryptography types

1. Symmetric Key Cryptography

In symmetric key cryptography, There is only one secret key is used for
encryption and decryption of the message.

By using this secret key the algorithms convert the original message into the fixed
length of bits known as a block cipher.

The same secret key which is used by the sender to encrypt the message is
transferred to the receiver through a secure channel, then after receiving the secret
key successfully, the receiver can decrypt the message by using this secret key.

It gives rise to the key distribution problem due to sender has to send the secret key
to the receiver through the secure channel.
2. Asymmetric Key Cryptography

In Asymmetric key cryptography, there are two different keys used for encryption
and decryption of the message.

These two different keys are named as the public key and the private key. Here the
public key is known to everyone but the private key is only owned by the receiver.

The public key is used to encrypt the message by the sender and the private key is
used to decrypt the message which is only owned by the receiver. So no other
person can decrypt that message, not even the sender.

This type of cryptography is widely used in the cryptocurrency world and even
bitcoin concept has used this type of cryptography technique.

It is used in the transmission of email files, social media communication, in the


remote server connections and the "https" protocol used it to secure information on
web communication.

3. Hashing

Hashing is the one-way encryption where no secret key is used as no need for
decryption.

Usually, hashing used the hash function which changed the original message into a
random unreadable text string of fixed length known as a hash.

This text string of fixed length can be used to check the validity of the message
that it was tampered or not by eves.

There is no way to obtain the original message from the hash string.

This technique is used in the blockchain technology as it helps to check the validity
of the whole blockchain which can be verified just by comparing the single hash to
the peers on the network and no need to verify the whole data of blockchain.
Functions of Cryptography
Modern cryptography is implemented by using the four primary cryptographic
functions:

1. Authentication

The Receiver can confirm the validity of the message that it was created by the
original sender and not tampered with.

It is like a sender sends a message by encrypting it with his private key and the
receiver can confirm that message by decrypting the message with the sender's
public key.

Example- The SSL certificate ('https') of the web server validates the proof of the
connection of the user to the right server.

2. Confidentiality

Third parties are not able to access or understand the original information or data
due to the strong encryption of cryptography.

Your information or data is secured even after it leaked to the other people.

3.Integrity

It must be ensured that data is not tampered or altered by eves during transmission
or storage.

Cryptography Hashing technique is used for the data integrity check where the
hash is used to ensure safe storage or transmission.

4. Non-repudiation

The owner or sender of information has no way to deny the ownership of that
information.

The sender can never be denied that the message or data not created by him.

Like, someone promised to pay later for a product and will deny in the future that
he/she didn't promise anything. In this situation, if cryptography is used then
he/she could never be denied his promise as the transaction was signed by him
cryptographically.

Crypto VIP Signal

Telegram Channel: https://t.me/CryptoVIPSignalTA


Twitter: https://twitter.com/Crptovipsignal
Contact Admin: https://t.me/jamess141

You might also like