Blog 19 - Cryptography
What is Cryptography?
Cryptography is a term used in computer science to describe secure information and communication systems that use mathematical principles and a series of rule-based calculations known as algorithms to change communications in difficult-to-decipher ways. These deterministic algorithms are used for cryptographic key generation, digital signature, data privacy verification, online surfing, and private communications including credit card transactions and email.
Cryptography and cryptology, as well as cryptanalysis, are closely linked subjects. Techniques such as microdots, merging words with images, and other methods of concealing information in storage or transit are included. However, in today's computer-centric world, cryptography is most commonly linked with scrambling plaintext (regular text, also known as cleartext) into ciphertext (a process known as encryption), then back again (known as decryption). Cryptographers are professionals who work in this sector.
Cryptography can be broken down into 4 different parts:
- Confidentiality
- Anyone who was not supposed to get the knowledge will be unable to comprehend it.
- Integrity
- The information cannot be tampered with either in storage or in transit between the sender and the intended recipient without being discovered.
- Non-repudiation
- The information creator/sender cannot later contradict their intentions in the development or transmission of the material.
- Authentication
- The sender and recipient may verify each other's identities as well as the information's origin and destination.
What are the different types of Cryptography?
Symmetric Key Cryptography: It is an encryption scheme in which the sender and receiver of a message encrypt and decode messages using a single shared key. Symmetric Key Systems are quicker and easier to use, but they have the drawback of requiring the sender and receiver to exchange keys in a safe way. Data Encryption Technology is the most widely used symmetric key encryption system (DES).
Hash Functions: In this method, there is no use of any key. The plain text is converted into a hash value with a defined length, making it difficult to restore its contents. Hash functions are used to encrypt passwords in a variety of operating systems.
Asymmetric Key Cryptography: A pair of keys is used to encrypt and decode information in this system. Encryption is done using a public key, whereas decryption is done with a private key. There is a distinction between a public key and a private key. Even though everyone knows the public key, the intended recipient can only decode it since only he knows the private key.