What is Cryptography? | Coinscapture

Source - https://coinscapture.com/blog/what-is-cryptography


Nowadays, due to the increased number of cyber-crimes, it is necessary to safeguard all the corporate secrets, classified information, and personal information from any unauthorized access. This is the phase where Cryptography comes into play and helps you in securing all the important data and maintain its confidentiality. Here’s a blog to help you understand what is cryptography and how it safely transmits all the personal and financial data on the web in case of online purchase or transaction and smartly avoids any security breach.

Cryptography is a process of converting simple plain text into unreadable text with the help of codes which can be processed and read only by the individuals intended to do. The word "crypt" means "hidden" or "vault" and "graphy" means "writing." Through cryptography, data is not only protected from alteration or theft but also helps in user’s authentication. Let’s take the help of a scenario to get more familiar with cryptography.

Imagine two friends Daniel and Christin are chatting on a social platform. Daniel sends a message to Christin who is on the other side of the world. This message is supposed to be private and confidential, but unfortunately, there is a smart guy called Nick in between who got access to their social platform and was able to read all of their private chats. This can be very fatal. So, how could this problem be solved? That’s where cryptography helps.  

Using cryptography, the readable text can be converted into an unreadable text by Daniel using a secret key to encrypt a message which is termed as a “Ciphertext”. Then Daniel sends this ciphertext over the social platform without any worry of anyone getting access to his message. Now, on the other side of the world, Christin would require the same secret key to decrypt this message in order to recover the original readable text. If anyone comes in between for eg. Nick, he won't be able to read the message because he lacks the decryption key.

Types of Cryptography: Based on the number of keys and algorithm, Cryptography is classified as:

1. Asymmetric or Public key cryptography:
The process in which two types of keys (public and private key) are required for encryption and decryption of the text. These keys are mathematically related to each other. Text can be encrypted with a public key and can be decrypted with the private key only. In order to avoid any security key breach, the private key has to be kept 100% secretly. The different types of asymmetric algorithms are RSA (Rivest-Sharmir-Adelman) algorithm is the most commonly used is this cryptography when sending sensitive data on the internet, Elliptic Curve Digital Signature Algorithm (ECDSA) is used byBitcoin, and Digital Signature Algorithm (DSA) is adopted as a Federal Information Processing Standard for digital signatures by NIST in FIPS 186-4.
2. Symmetric Cryptography:
The process in which only one key is required for encryption and decryption of the data.  The sender uses this key to encrypt the plain text and send the ciphertext to the receiver. The receiver uses the same key and decrypt the ciphertext into plain text. The different types of symmetric algorithms are AES (Advanced Encryption Standard), DES (Data Encryption Standard), IDEA (International Data Encryption Algorithm), Blowfish (Drop-in replacement for DES or IDEA), RC4 (Rivest Cipher 4), RC5 (Rivest Cipher 5) and RC6 (Rivest Cipher 6)
3. Hash Functions:
In this process, there is no requirement of a key to encrypt or decrypt data. Instead, a fixed length of the hash value is computed by repeating/iterating the text randomly multiple times depending on the length of the plain text which makes the data impossible to recover. The different types of Hash functions are SHA-1 (Secure Hash Algorithm 1), SHA-2 and SHA-3.

https://www.minds.com/newsfeed/974571409883787264
https://www.pearltrees.com/coinscapturecom#item257785600/l243
https://imgur.com/gallery/Z9PfHI7
http://tinypic.com/r/2214as/9
http://www.23hq.com/coinscapture/photo/54801516
http://www.23hq.com/coinscapture/photo/54801519
http://www.23hq.com/coinscapture/photo/54801538
http://www.23hq.com/coinscapture/photo/54801541
https://flic.kr/p/2fNQEQ9
https://flic.kr/p/2fTrXJp
https://flic.kr/p/2fTs1eV
https://flic.kr/p/25gPFXD
https://www.4shared.com/photo/M_GbaMUUee/What_is_Cryptography.html
https://www.4shared.com/photo/sRdDtEvZda/What_is_Cryptography_1.html
https://www.4shared.com/photo/gccvkDdHgm/What_is_Cryptography_2.html
https://www.4shared.com/photo/od3FykM0ee/What_is_Cryptography_3.html
http://www.imagebam.com/image/75ea2c1220922754
http://www.imagebam.com/image/03efdc1220923894
http://www.imagebam.com/image/3b0c5d1220925194
http://www.imagebam.com/image/a49bf91220925974
https://www.pearltrees.com/coinscapturecom/item257789421
https://www.pearltrees.com/coinscapturecom/item257789511
https://www.pearltrees.com/coinscapturecom/item257789562
https://www.pearltrees.com/coinscapturecom/item257789644#l279

Comments