0% found this document useful (0 votes)
8 views8 pages

Cryptography

Cryptography is a method of securing information through codes, ensuring confidentiality, integrity, non-repudiation, authentication, interoperability, and adaptability. It includes symmetric and asymmetric key cryptography, as well as hash functions, with algorithms like AES, DES, RSA, and SHA used for various encryption and data integrity purposes. The advantages of cryptography include secure online communication, access control, and protection against various cyber threats.

Uploaded by

akashkhawle1306
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views8 pages

Cryptography

Cryptography is a method of securing information through codes, ensuring confidentiality, integrity, non-repudiation, authentication, interoperability, and adaptability. It includes symmetric and asymmetric key cryptography, as well as hash functions, with algorithms like AES, DES, RSA, and SHA used for various encryption and data integrity purposes. The advantages of cryptography include secure online communication, access control, and protection against various cyber threats.

Uploaded by

akashkhawle1306
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Cryptography

Cryptography is a technique of securing information and communications


through the use of codes so that only those persons for whom the
information is intended can understand and process it. Thus, preventing
unauthorized access to information. The prefix “crypt” means “hidden”
and the suffix “graphy” means “writing”. In Cryptography, the techniques
that are used to protect information are obtained from mathematical
concepts and a set of rule-based calculations known as algorithms to
convert messages in ways that make it hard to decode them. These
algorithms are used for cryptographic key generation, digital signing, and
verification to protect data privacy, web browsing on the internet and to
protect confidential transactions such as credit card and debit card
transactions.

Features Of Cryptography
 Confidentiality: Information can only be accessed by the person for
whom it is intended and no other person except him can access it.
 Integrity: Information cannot be modified in storage or transition
between sender and intended receiver without any addition to
information being detected.
 Non-repudiation: The creator/sender of information cannot deny his
intention to send information at a later stage.
 Authentication: The identities of the sender and receiver are
confirmed. As well destination/origin of the information is confirmed.
 Interoperability: Cryptography allows for secure communication
between different systems and platforms.
 Adaptability: Cryptography continuously evolves to stay ahead of
security threats and technological advancements.
There are some types of cryptography
 Symmetric key cryptography
 Asymmetric key cryptography
 Hash functions (hashing)

Types of Cryptography Algorithm


 Advanced Encryption Standard (AES): AES (Advanced Encryption
Standard) is a popular encryption algorithm which uses the same key
for encryption and decryption It is a symmetric block cipher algorithm
with block size of 128 bits, 192 bits or 256 bits. AES algorithm is widely
regarded as the replacement of DES (Data encryption standard)
algorithm.
 Data Encryption Standard (DES): DES (Data encryption standard) is
an older encryption algorithm that is used to convert 64-bit plaintext
data into 48-bit encrypted ciphertext. It uses symmetric keys (which
means same key for encryption and decryption). It is kind of old by
today’s standard but can be used as a basic building block for learning
newer encryption algorithms.
 RSA: RSA is an basic asymmetric cryptographic algorithm which uses
two different keys for encryption. The RSA algorithm works on a block
cipher concept that converts plain text into cipher text and vice versa.
 Secure Hash Algorithm (SHA): SHA is used to generate unique
fixed-length digital fingerprints of input data known as hashes. SHA
variations such as SHA-2 and SHA-3 are commonly used to ensure
data integrity and authenticity. The tiniest change in input data
drastically modifies the hash output, indicating a loss of integrity.
Hashing is the process of storing key value pairs with the help of a
hash function into a hash table.

Advantages of Cryptography
 Cryptography can be used for access control to ensure that only
parties with the proper permissions have access to a resource.
 For secure online communication, it offers secure mechanisms for
transmitting private information like passwords, bank account numbers,
and other sensitive data over the Internet.
 It helps in the defense against various types of assaults including
replay and man-in-the-middle attacks.
 Cryptography can help firms in meeting a variety of legal requirements
including data protection and privacy legislation.
1. Symmetric Key Cryptography
It is an encryption system where the sender and receiver of a message
use a single common key to encrypt and decrypt messages. Symmetric
Key cryptography is faster and simpler but the problem is that the sender
and receiver have to somehow exchange keys securely. The most popular
symmetric key cryptography systems are Data Encryption Systems
(DES) and Advanced Encryption Systems (AES) .

In the above figure we see first sender type a message in plaintext(normal


messge)
than there we create one secret key

and convert that data in ciphered data (the languge that no one can read )
that mean we encrypted that data .
Now data shared to reciver and we have to share secret key also with it ..
After that we have convert it into readble format . so first we have to share
that secret key and than decryption process start and we get original text or
message.
2. Asymmetric Key Cryptography
In Asymmetric Key Cryptography, a pair of keys is used to encrypt and
decrypt information. A sender’s public key is used for encryption and a
receiver’s private key is used for decryption. Public keys and Private keys
are different. Even if the public key is known by everyone the intended
receiver can only decode it because he alone knows his private key. The
most popular asymmetric key cryptography algorithm is the RSA
algorithm.

In asymmetric thereare two keys in the first is public and another is private
key . we have to generate that first –

Now have to do that same process of encryption .


Ciphered text that generated after encryption.

We starting the Decryption process


Here we got that Decrypted data

2. Hash Functions
There is no usage of any key in this algorithm. A hash value with a fixed
length is calculated as per the plain text which makes it impossible for the
contents of plain text to be recovered. Many operating systems use hash
functions to encrypt passwords.

You might also like