0% found this document useful (0 votes)
10 views3 pages

Cañon 2

Cryptography secures information by converting it into an unreadable format to prevent unauthorized access, utilizing principles like confidentiality and integrity. It includes symmetric encryption, which uses a single key for both encryption and decryption, and asymmetric encryption, which employs a public and private key for enhanced security. Practical applications span secure communications, online banking, and data protection.

Uploaded by

jamesrian632
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Cañon 2

Cryptography secures information by converting it into an unreadable format to prevent unauthorized access, utilizing principles like confidentiality and integrity. It includes symmetric encryption, which uses a single key for both encryption and decryption, and asymmetric encryption, which employs a public and private key for enhanced security. Practical applications span secure communications, online banking, and data protection.

Uploaded by

jamesrian632
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cañon, Rian James A.

BSIT 3A
Cryptography
Cryptography is a method of securing information by converting it into an
unreadable format to prevent unauthorized access. It is widely used in
modern applications such as online transactions, secure messaging, and data
protection. The field of cryptography has evolved from simple substitution
ciphers to highly complex encryption algorithms used in contemporary
cybersecurity.
Understanding Cryptography
Cryptography is built on the principles of confidentiality, integrity,
authentication, and non-repudiation. It ensures that only authorized
individuals can access the intended message while maintaining its
authenticity and preventing any alterations during transmission.
Various encryption techniques help achieve these goals, ranging from
traditional methods to advanced computational algorithms. Two primary
types of encryptions are symmetric encryption and asymmetric
encryption.
Symmetric Encryption
Symmetric encryption, also known as secret-key encryption, relies on a
single key for both encryption and decryption. This method is efficient and
fast but requires a secure method for key distribution between parties.
Common symmetric encryption algorithms include:
 Advanced Encryption Standard (AES): A widely used encryption
standard ensuring strong security.
 Data Encryption Standard (DES): An older encryption method now
largely replaced due to vulnerabilities.
 Triple DES (3DES): An improvement over DES by applying encryption
multiple times for increased security.

While symmetric encryption is beneficial for encrypting large amounts of


data quickly, its main challenge lies in securely sharing the secret key
between users.

Asymmetric Encryption

Asymmetric encryption, also known as public-key cryptography, involves the


use of two distinct keys: a public key for encryption and a private key for
decryption. This approach enhances security by eliminating the need for a
shared secret key.

Key features of asymmetric encryption:

 The public key can be openly shared, while the private key remains
confidential.
 It is commonly used for secure communications, digital signatures, and
authentication.
 Asymmetric encryption provides a higher level of security but is
computationally slower compared to symmetric encryption.

Popular asymmetric encryption algorithms include:

 RSA (Rivest-Shamir-Adleman): Used in secure web communications


and digital signatures.
 Elliptic Curve Cryptography (ECC): Offers strong security with
smaller key sizes, making it efficient.
 Diffie-Hellman Key Exchange: A protocol for securely exchanging
cryptographic keys over an insecure channel.

Practical Applications of Cryptography

Cryptography is used in various fields, including:

 Secure Communications: Protecting emails, messaging apps, and


virtual private networks (VPNs).

 Online Banking & E-Commerce: Ensuring secure transactions


through encrypted data exchange.
 Data Protection: Encrypting sensitive data stored in databases and
cloud environments.

REFERENCES

Stallings, W. (2017). Cryptography and network security: Principles and


practice (7th ed.). Pearson.

You might also like