0% found this document useful (0 votes)
2 views

Cryptography

Uploaded by

Kenneth Ngum
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Cryptography

Uploaded by

Kenneth Ngum
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Cryptography Definition

Nowadays, computing systems play a significant role in every aspect of human activity.
Every marketing, software, banking, healthcare, and education application uses this
computing technology. However, you might be curious about how businesses protect
their data and maintain the privacy of their banking activities.

"Cryptography" is the answer to each of these questions. In today's connected world,


sensitive information must be protected, which is why cryptography has influenced the
current information age.

Additionally, Gmail data is secured using cryptography and is transmitted throughout


Google data centers in an encrypted manner. Cryptography is therefore regarded as the
essential component for protecting shared information.

Cryptography
Cryptography uses codes to protect data and communications so only the intended
receivers can decode and understand them. Consequently, restricting access to
information from outside parties.
"Crypto" indicates "hidden," and "graphy" indicates "writing," respectively. The techniques
used in cryptography to secure data are based on mathematical principles and a set of
rule-based calculations known as algorithms to modify signals in a way that makes them
challenging to decode.

These algorithms generate cryptographic keys, create digital signatures, safeguard data
privacy, enable online browsing on the Internet, and ensure the confidentiality of private
transactions like credit and debit card payments.

History of Cryptography
Cryptography started with ciphers, the initial among which was the Caesar Cipher.
Contrasted to modern algorithms for cryptography, ciphers were much simpler to decode,
yet both employed plaintext and keys.

Though simple, the earliest forms of encryption were ciphers. Modern cryptosystems and
algorithms are considerably more advanced. They employ numerous iterations of ciphers
and encrypt the ciphertext of messages to ensure the most secure data transportation
and storage.

Currently used cryptography techniques can potentially be irreversible, ensuring the


message's security forever. The requirement for data to be safeguarded more securely
than ever before has led to the development of more complex cryptography methods.
Most early cryptographic ciphers and algorithms have been cracked, making them
ineffective for data security.

It would sometimes take years or even decades to figure out the meaning of a single
message, even though it is possible to interpret today's algorithms. Thus, the competition
to develop newer and more powerful cryptographic techniques continues.
What is The Purpose of Cryptography?
Cryptography aims to keep data and messages private and inaccessible to possible threats
or bad actors. It frequently works invisibly to encrypt and decrypt the data you send
through email, social media, applications, and website interactions.

There are several uses for symmetric cryptography, including:

o Payment applications and card transactions


o Random number generation
o Verify the sender's signature to be sure they are who they claim they are

There are several uses for asymmetric cryptography, including:

o Email messages
o SIM card authentication
o Web security
o Exchange of private keys

Types of Cryptography

There are three main types of cryptography:

Symmetric key Cryptography: With the encryption technique, the sender and the
recipient use the same shared key to encrypt and decrypt messages.
Although symmetric key systems are quicker and easier to use, they have the drawback
of requiring a secure key exchange between the sender and the receiver. Data Encryption
System (DES) is the most widely used symmetric key encryption method.

Hash Functions: In this algorithm, no key is used. The plain text is used to produce a hash
value that has a fixed length, making it challenging to retrieve the plain text's information.
Hash functions are widely used by operating systems to encrypt passwords.

Asymmetric Key Cryptography: This approach uses a set of keys to encrypt and decrypt
data. Public keys are used for encryption, whereas private keys are used for decryption.

The Public Key and Private Key are different from one another. Even if everyone knows
the public key, only the intended recipient may decode the message since only he can
access the private key.
Techniques Used for Cryptography

In the age of computers, cryptography is frequently associated with converting plain text
into cipher text, which is text that the intended recipient can only decode. This process is
known as encryption. The process of converting encrypted text into plain text is called
decryption.

Features of Cryptography
Cryptography has the following features:

o Confidentiality: The only person who can access information is the one it is
intended for, which is the primary feature of cryptography.
o Integrity: Information cannot be altered while it is being stored or sent from the
sender to the intended destination without the recipient spotting the addition of
new information in Cryptography.
o Non-repudiation: The creator/sender of a message cannot deny his intent to send
information at a future point.
o Authentication: The identities of the sender and the recipient have been
confirmed. Furthermore, the information's source and final destination are
confirmed.
o Availability: It also ensures that the required information is available to authorized
users at the appropriate time.
o Key Management: The creation, distribution, storage, and alteration of
cryptographic keys take place in this process.
o Algorithm: Mathematical formulae are used in cryptography to encrypt and
decrypt messages.
o Digital Signatures: A signature that can be applied to messages to protect the
message's authenticity and sender identification.

Cryptography vs. Cryptology


Cryptography refers to "secret writing," with the word "crypt" standing for "hidden" or
"secret." While the terms cryptography and cryptology are sometimes used
interchangeably, respectively, cryptology is the theory, and cryptography is the practice
of composing secret messages.

Cryptology is defined as "knowledge of secrecy." Converting plaintext into ciphertext is


known as encryption or "making secret." Although encryption is an integral component
of cryptography, it does not cover the full field of science. The reverse of encryption is
decryption.

The most important aspect of the encryption process is that it usually includes both an
algorithm and a key. A key is only an extra bit of information?almost always a number?that
describes how the plaintext will be treated when the algorithm encrypts it.

In a safe cryptographic system, even though you know the process by which a particular
message is encrypted, it must be hard or impossible to decrypt without that key.

Encryption and Decryption


Cryptography involves two phases at its most fundamental level: Encryption and
Decryption.

Encryption uses a cipher to encrypt and transform the plaintext into ciphertext. On the
other hand, decryption transforms the ciphertext into plaintext by employing the same
cipher.
The most popular application of cryptography when sending electronic data is encrypting
and decrypting emails and other plaintext messages. The simplest method is the "secret
key" or symmetric approach.

The secret key is used to encrypt data, and after decoding, the secret key and encoded
message are sent to the recipient. What is the problem, then? A third party is all they need
to decode and analyze the message if it is intercepted.

Cryptologists developed the asymmetric or "public key" approach to solve this issue. Each
user, in this case, has two keys: a private key and a public key. Senders request the
recipient's public key before encrypting and sending the message.

Cryptographic Algorithms
Cryptosystems encrypt and decrypt information using cryptographic algorithms, or
ciphers, to secure communications between computer systems, devices, and applications.

A cipher suite uses three different algorithms: one for encryption, message authentication,
and key exchange. This process, integrated into protocols and developed using software
that runs on operating systems (OS) and networked computer systems, involves:

o Data encryption and decryption using the production of public and private keys
o To authenticate messages, use digital signature and verification
o Key exchange

Advantages

Access Management: Access control can use cryptography to guarantee that only
individuals with the appropriate authorizations are granted access to a resource. The
resource is encrypted and can only be accessed by those with the proper decryption key.

Secure Communication: Cryptography is essential for private communication over the


Internet. It provides safe methods for sending sensitive data like bank account numbers,
passwords, and other private information over the Internet.

Protection against attacks: Attacks like replay and man-in-the-middle attacks can be
defended against with the help of cryptography. It provides techniques for identifying
and preventing these assaults.

Compliance with legal requirements: Businesses can use cryptography to help them
deal with several legal obligations, such as data protection and privacy laws.

Applications of Cryptography
Computer passwords: Cryptography is frequently used in computer security, especially
when creating and managing passwords. When users log in, their password is hashed and
contrasted with the previously saved hash. To store them, passwords are first hashed and
encrypted. This method encrypts the passwords so that even if hackers can access the
password database, they can't comprehend the passwords.

Digital Currencies: Cryptography is also used by digital currencies like Bitcoin to secure
transactions and prevent fraud. Since advanced algorithms and cryptographic keys
safeguard transactions, tampering with or creating fake transactions is practically
impossible.

Secure web browsing: Cryptography protects users from eavesdropping in on their


conversations and man-in-the-middle attacks and provides online browsing security. The
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols use public key
cryptography to encrypt data between the web server and the client, creating a secure
communication channel.

Digital signatures: Digital signatures are used to sign papers and act as the handwritten
signature's digital copy. Cryptography is used to create digital signatures, and public key
cryptography is used to verify them. Digital signatures are becoming more widely used,
and many countries have laws that make them legally binding.

Authentication: When logging into a computer, cryptography is employed as the


authentication method, for example, a bank account or a secure network. The
authentication protocols use cryptographic techniques to validate the user's identity and
possession of the necessary access privileges to the resource.

Cryptocurrencies: Cryptocurrencies like Bitcoin and Ethereum largely rely on


cryptography to protect transactions, prevent fraud, and uphold the integrity of the
network. Transactions are protected by complicated algorithms and cryptographic keys,
making it nearly impossible to tamper with or fake transactions.

End-to-End Encryption: Email, instant messages, and video chats are all examples of
two-way communications protected by end-to-end encryption. Even if a message is
encrypted, this guarantees that only the intended recipients can decode it. End-to-end
encryption is frequently employed in messaging apps like WhatsApp and Signal, offering
users high protection and anonymity.

Summary
Cryptography is the process of encoding data to protect it from unauthorized access,
maintain its privacy, and guarantee its secrecy. It shields private data from prying eyes in
various fields, including communications, computer security, and financial transactions.

Some common types of cryptography are:

o Symmetric-key cryptography
o Asymmetric-key cryptography
o Hashing

Data can be encoded, sent, and decoded using cryptography, which frequently uses secret
keys to maintain security. Cryptography uses mathematical methods and protocols.

You might also like