Cryptography
Cryptography
Features Of Cryptography
Confidentiality: Information can only be accessed by the person for
whom it is intended and no other person except him can access it.
Integrity: Information cannot be modified in storage or transition
between sender and intended receiver without any addition to
information being detected.
Non-repudiation: The creator/sender of information cannot deny his
intention to send information at a later stage.
Authentication: The identities of the sender and receiver are
confirmed. As well destination/origin of the information is confirmed.
Interoperability: Cryptography allows for secure communication
between different systems and platforms.
Adaptability: Cryptography continuously evolves to stay ahead of
security threats and technological advancements.
There are some types of cryptography
Symmetric key cryptography
Asymmetric key cryptography
Hash functions (hashing)
Advantages of Cryptography
Cryptography can be used for access control to ensure that only
parties with the proper permissions have access to a resource.
For secure online communication, it offers secure mechanisms for
transmitting private information like passwords, bank account numbers,
and other sensitive data over the Internet.
It helps in the defense against various types of assaults including
replay and man-in-the-middle attacks.
Cryptography can help firms in meeting a variety of legal requirements
including data protection and privacy legislation.
1. Symmetric Key Cryptography
It is an encryption system where the sender and receiver of a message
use a single common key to encrypt and decrypt messages. Symmetric
Key cryptography is faster and simpler but the problem is that the sender
and receiver have to somehow exchange keys securely. The most popular
symmetric key cryptography systems are Data Encryption Systems
(DES) and Advanced Encryption Systems (AES) .
and convert that data in ciphered data (the languge that no one can read )
that mean we encrypted that data .
Now data shared to reciver and we have to share secret key also with it ..
After that we have convert it into readble format . so first we have to share
that secret key and than decryption process start and we get original text or
message.
2. Asymmetric Key Cryptography
In Asymmetric Key Cryptography, a pair of keys is used to encrypt and
decrypt information. A sender’s public key is used for encryption and a
receiver’s private key is used for decryption. Public keys and Private keys
are different. Even if the public key is known by everyone the intended
receiver can only decode it because he alone knows his private key. The
most popular asymmetric key cryptography algorithm is the RSA
algorithm.
In asymmetric thereare two keys in the first is public and another is private
key . we have to generate that first –
2. Hash Functions
There is no usage of any key in this algorithm. A hash value with a fixed
length is calculated as per the plain text which makes it impossible for the
contents of plain text to be recovered. Many operating systems use hash
functions to encrypt passwords.