Dec 3, 2022

Cryptography For You

Cryptography Digital Currencies Secure web


Cryptography is the art of securing information and communications using codes so that only the person for whom it is intended can understand and process it. Hence preventing unauthorized access to information. The prefix "crypt" means "hidden" and the suffix "graphy" means "to write." Cryptography techniques are used to protect information based on mathematical concepts and rule-based calculations known as algorithms to convert messages in ways that make it difficult to decipher. These algorithms are used for cryptographic key generation, digital signing, verification to protect confidential information, websites on the Internet, and to protect confidential transactions such as credit card and debit transactions.

Techniques used for Cryptography: 

In today's era of computers, cryptography is often associated with a process where ordinary plain text is converted to a known text, which text is made such that the receiver can only decode the intended text and therefore this process is known as encryption. The process of converting plain text to plain text is known here as decryption. The following are the features of Cryptography,

Confidentiality: Information cannot be accessed by the person to whom it is not intended, nor can anyone else access it.

Integrity: Information cannot be changed in storage or in transit between the intended recipient and sender without any additional information being detected.

Non-repudiation: The author/sender of the information cannot deny his intention to send the information later.

Authentication: authentication is the process in the cryptography identification of the sender and receiver are confirmed. Then the destination data source is confirmed.

Types of Cryptography:

The most common types of cryptography are three,

Symmetric Key Cryptography: In this type of cryptography, Encryption is a system in which the message sender and receiver use one common key to encrypt and decrypt messages. Symmetric key systems are faster and simpler, but the problem is that the sender and receiver somehow exchange the key in a certain way. The most popular system of symmetric key cryptography is the Data Encryption System(DES).

Subtract functions: There is no use of key in this algorithm. The subtraction value of the fixed length is calculated as per the plain text, which makes it impossible to receive the whole text. Many operating systems use encryption functions to encrypt passwords.

Asymmetric Key Cryptography: In the process of the asymmetric Key Cryptography a pair of keys is used for both encrypt and decrypt data or information. asymmetric Key Cryptography used public key for the encryption, and for decryption of the data or information private key is used. Public Key and Private Key are different. Even if the public key is known to everyone, the intended recipient can only decrypt it because only he knows the private key.

Applications of Cryptography:

Computer passwords

Digital Currencies

Secure web browsing

Electronic Signatures



End-to-end encryption.