Cryptography CH 2
Cryptography CH 2
The prefix “crypt” means “hidden” and suffix “graphy” means “writing”. In
Cryptography the techniques which are use to protect information are obtained from
mathematical concepts and a set of rule based calculations known as algorithms to
convert messages in ways that make it hard to decode it. These algorithms are used
for cryptographic key generation, digital signing, verification to protect data privacy,
web browsing on internet and to protect confidential transactions such as credit card
and debit card transactions.
Types Of Cryptography
• In general there are three types Of cryptography:
• Symmetric Key Cryptography: It is an encryption system where the
sender and receiver of message use a single common key to encrypt
and decrypt messages. Symmetric Key Systems are faster and simpler
but the problem is that sender and receiver have to somehow exchange
key in a secure manner. The most popular symmetric key
cryptography system are Data Encryption System(DES) and Advanced
Encryption System(AES).
Symmetric Key Cryptography
• Asymmetric Key Cryptography:
• Under this system a pair of keys is used to encrypt and decrypt
information. A receiver’s public key is used for encryption and a
receiver’s private key is used for decryption. Public key and Private
Key are different. Even if the public key is known by everyone the
intended receiver can only decode it because he alone know his private
key. The most popular asymmetric key cryptography algorithm is RSA
algorithm.
Asymmetric Key Cryptography:
• Hash Functions: There is no usage of any key in this algorithm. A
hash value with fixed length is calculated as per the plain text which
makes it impossible for contents of plain text to be recovered. Many
operating systems use hash functions to encrypt passwords.
• Hash functions are extremely useful and appear in almost all
information security applications.
• A hash function is a mathematical function that converts a numerical
input value into another compressed numerical value. The input to the
hash function is of arbitrary length but output is always of fixed
length.
Hash Functions
Applications Of Cryptography:
• Computer passwords:
Cryptography is widely utilized in computer security, particularly when
creating and maintaining passwords. When a user logs in, their
password is hashed and compared to the hash that was previously
stored. Passwords are hashed and encrypted before being stored. In this
technique, the passwords are encrypted so that even if a hacker gains
access to the password database, they cannot read the passwords.
• Digital Currencies:
• To safeguard transactions and prevent fraud, digital currencies like
Bitcoin also use cryptography. Complex algorithms and cryptographic
keys are used to safeguard transactions, making it nearly hard to
tamper with or forge the transactions.
• Electronic signatures:
• Electronic signatures serve as the digital equivalent of a handwritten
signature and are used to sign documents. Digital signatures are
created using cryptography and can be validated using public key
cryptography. In many nations, electronic signatures are enforceable
by law, and their use is expanding quickly.
• Authentication:
• Cryptography is used for authentication in many different situations,
such as when accessing a bank account, logging into a computer, or
using a secure network. Cryptographic methods are employed by
authentication protocols to confirm the user’s identity and confirm that
they have the required access rights to the resource.
• Cryptocurrencies:
• Cryptography is heavily used by cryptocurrencies like Bitcoin and
Ethereum to safeguard transactions, thwart fraud, and maintain the
network’s integrity. Complex algorithms and cryptographic keys are
used to safeguard transactions, making it nearly hard to tamper with or
forge the transactions.
• End-to-End Encryption:
• End-to-end encryption is used to protect two-way communications
like video conversations, instant messages, and email. Even if the
message is encrypted, it assures that only the intended receivers can
read the message. End-to-end encryption is widely used in
communication apps like WhatsApp and Signal, and it provides a high
level of security and privacy for users.