0% found this document useful (0 votes)
11 views

CRYPTOGRAPHY

Cryptography is the practice of using codes to secure data and communications, ensuring that only intended recipients can access the information. It encompasses various features such as confidentiality, integrity, and authentication, and employs techniques like symmetric and asymmetric key cryptography, as well as hash functions. Applications of cryptography include secure web browsing, electronic signatures, and end-to-end encryption, providing advantages like secure communication and protection against attacks.

Uploaded by

hkaur4064
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

CRYPTOGRAPHY

Cryptography is the practice of using codes to secure data and communications, ensuring that only intended recipients can access the information. It encompasses various features such as confidentiality, integrity, and authentication, and employs techniques like symmetric and asymmetric key cryptography, as well as hash functions. Applications of cryptography include secure web browsing, electronic signatures, and end-to-end encryption, providing advantages like secure communication and protection against attacks.

Uploaded by

hkaur4064
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CRYPTOGRAPHY

Cryptography uses codes to protect data and communications so only the intended receivers can
decode and understand them. Consequently, restricting access to information from outside
parties.

"Crypto" indicates "hidden," and "graphy" indicates "writing," respectively. The techniques used
in cryptography to secure data are based on mathematical principles and a set of rule-based
calculations known as algorithms to modify signals in a way that makes them challenging to
decode.

These algorithms generate cryptographic keys, create digital signatures, safeguard data privacy,
enable online browsing on the Internet, and ensure the confidentiality of private transactions like
credit and debit card payments.

Features of Cryptography are as follows:


1. Confidentiality: Information can only be accessed by the person for whom it is

intended and no other person except him can access it.


2. Integrity: Information cannot be modified in storage or transition between sender

and intended receiver without any addition to information being detected.


3. Non-repudiation: The creator/sender of information cannot deny his intention to

send information at a later stage.


4. Authentication: The identities of sender and receiver are confirmed. As well as the

destination/origin of information is confirmed.


5. Availability: It also ensures that the required information is available to authorized

users at the appropriate time.


6. Key Management: The creation, distribution, storage, and alteration of

cryptographic keys take place in this process.


7. Algorithm: Mathematical formulae are used in cryptography to encrypt and decrypt

messages.
8. Digital Signatures: A signature that can be applied to messages to protect the

message's authenticity and sender identification.

Types of Cryptography

1. Symmetric Key Cryptography: It is an encryption system where the sender and

receiver of a message use a single common key to encrypt and decrypt messages.
Symmetric Key Systems are faster and simpler but the problem is that sender and
receiver have to somehow exchange keys in a secure manner. The most popular
symmetric key cryptography systems are Data Encryption System(DES) and Advanced
Encryption System(AES).
2. Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and

decrypt information. A receiver’s public key is used for encryption and a receiver’s
private key is used for decryption. Public keys and Private keys are different. Even if the
public key is known by everyone, the intended receiver can only decode it because he
alone knows his private key. The most popular asymmetric key cryptography algorithm is
RSA algorithm.
3. Hash Functions: There is no usage of any key in this algorithm. A hash value with fixed

length is calculated as per the plain text which makes it impossible for contents of plain
text to be recovered. Many operating systems use hash functions to encrypt passwords.

Applications of Cryptography:

1. Computer passwords: Cryptography is widely utilized in computer security,

particularly when creating and maintaining passwords. When a user logs in, their
password is hashed and compared to the hash that was previously stored. Passwords
are hashed and encrypted before being stored. In this technique, the passwords are
encrypted so that even if a hacker gains access to the password database, they cannot
read the passwords.
2. Secure web browsing: Online browsing security is provided by the use of

cryptography, which shields users from eavesdropping and man-in-the-middle


assaults. Public key cryptography is used by the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols to encrypt data sent between the web server
and the client, establishing a secure channel for communication.
3. Electronic signatures: Electronic signatures serve as the digital equivalent of a

handwritten signature and are used to sign documents. Digital signatures are created
using cryptography and can be validated using public key cryptography. In many
nations, electronic signatures are enforceable by law, and their use is expanding
quickly.
4. Authentication: Cryptography is used for authentication in many different situations,

such as when accessing a bank account, logging into a computer, or using a secure
network. Cryptographic methods are employed by authentication protocols to confirm
the user’s identity and confirm that they have the required access rights to the
resource.
5. End-to-End Encryption: End-to-end encryption is used to protect two-way

communications like video conversations, instant messages, and email. Even if the
message is encrypted, it assures that only the intended receivers can read the message.
End-to-end encryption is widely used in communication apps like WhatsApp and
Signal, and it provides a high level of security and privacy for users.

Advantages of Cryptography :-

1. Access Control: Cryptography can be used for access control to ensure that only

parties with the proper permissions have access to a resource. Only those with the
correct decryption key can access the resource thanks to encryption.
2. Secure Communication: For secure online communication, cryptography is crucial.

It offers secure mechanisms for transmitting private information like passwords, bank
account numbers, and other sensitive data over the internet.
3. Protection against attacks: Cryptography aids in the defense against various types

of assaults, including replay and man-in-the-middle attacks. It offers strategies for


spotting and stopping these assaults.
4. Compliance with legal requirements: Cryptography can assist firms in meeting a

variety of legal requirements, including data protection and privacy legislation.

You might also like