Maths Cryptography Board Practical Maths CBSE
Maths Cryptography Board Practical Maths CBSE
WHAT IS CRYPTOGRAPHY?
CRYPTOGAPHY TECHNIQUES
TYPES OF CRYPTOGRAPHY
TO ENCODE A MESSAGE
TO DECODE A MESSAGE
APPLICATIONS OF CRYPTOGRAPHY
ADVANTAGES OF CRYPTOGRAPHY
EXAMPLES
CRYPTOGRAPHY
What is Cryptography?
Cryptography is a captivating field closely related to cryptology and
cryptanalysis. It encompasses a wide range of techniques, including the use of
microdots, steganography (which involves merging words with images), and other
ingenious methods to conceal information during storage or transmission. .It is a
technique of securing information and communications through the use of codes so
that only those persons for whom the information is intended can understand and
process it. Thus preventing unauthorized access to information. The prefix “crypt”
means “hidden” and the suffix “graphy” means “writing”. In Cryptography, the
techniques that are used to protect information are obtained from mathematical
concepts and a set of rule-based calculations known as algorithms to convert
messages in ways that make it hard to decode them. These algorithms are used for
cryptographic key generation, digital signing, and verification to protect data
privacy, web browsing on the internet and to protect confidential transactions such
as credit card and debit card transactions.
Cryptography techniques
Cryptography is closely related to the discipline of cryptology and cryptanalysis. It
includes techniques such as microdots, merging words with images and other ways
to hide information in storage or transit. In today's computer-centric world,
cryptography is most often associated with scrambling plaintext (ordinary text,
sometimes referred to as clear text) into cipher text(a process called encryption),
then back again (known as decryption). Individuals who practice this field are
known as cryptographers.
Procedures and protocols that meet some or all the above criteria are known as
cryptosystems. Cryptosystems are often thought to refer only to mathematical
procedures and computer programs; however, they also include the regulation of
human behavior, such as choosing hard-to-guess passwords, logging off unused
systems and not discussing sensitive procedures with outsiders.
Types of cryptography
2. Hash Functions:
Hash functions do not use any key. Instead, they calculate a fixed-length
hash value based on the input plaintext.
The resulting hash value makes it impossible to recover the original
plaintext.
Operating systems often use hash functions to securely encrypt passwords.
TO ENCODE A MESSAGE
TO DECODE A MESSAGE
1. Take the string of coded numbers and multiply it by the inverse of the matrix
that was used to encode the message.
Access Control: Cryptography can be used for access control to ensure that only
parties with the proper permissions have access to a resource. Only those with
the correct decryption key can access the resource thanks to encryption.
Protection against attacks: Cryptography aids in the defense against various types
of assaults, including replay and man-in-the-middle attacks. It offers strategies
for spotting and stopping these assaults.