All about cryptography! 2024

ryptography

What is cryptography?

The study of secure communication techniques that allow only the sender and intended recipient of a message to read its content is known as cryptography. The terms comes from the greek work kryptos. Which means hidden. It is closely Linked to encryption. Which is the process of scrambling plain text into cipher text and back again when it is received.Learn about the different types of  cryptography and the differences between them. There are 3 different type of cryptography. 1. Symmetric 2.asymmetric 3. Hash function.

symmetric, asymmetric, and hash functions!

The same key is used for encryption and decryption. Both the sender and  the receiver must have aceeess to the same common key. Where asymmetric cryptography uses separate keys to encryption and decryption. A public key can be used by a person to encrypt a message so that it can be decrypted by the intended recipient with their private key. private key is shared only with the keys initiated. And hash functions are one-way irreversible functions that safeguard data. While preventing the reception of the original message. hash is method of converting a variable-length string into fixed-length string. Now see What are the main objectives of cryptography. Confideentially, non-repudiation, Integrity, authenticity. With cryptography, both data and transit and data at rest can be kept confidential and secure. Cryptography guards against reputation by authenticating the sender and recipient. It can secure messages that pass via untrustworthy networks. Cryptographic technologies like SSl or TLS provide confidentiality and integrity protection that can protect communication from malicious eavesdropping and alterations.
Cryptography can also be used to ensure authenticity safeguards and implement secure system communication. It prevents sensitive data stored in the physical medium from being deciphered. It ensures data integrity and protection.

Mechanism of cryptography!

There is some security mechanism for cryptography. The first one is an acquaintance! Well, what do we find in education? Enchiphermate basically refers to hiding or covering data. This can provide confidentiality.
The data integrity is a short check value. So we are ensuring our data integrity by appending our short check value to the data or message. That we are sending and this check value created by a very specific process from the data itself. So the receiver receive the data and the check value. Now the receiver will create a new value from the received data. Then the receivable will compare the newly created check value with the one received.  If the two check values are the same, then the integrity of the data has been preserved. This is what stands for data integrity.
Now see what digital signature is! digital signature is a means by which the sender can electronically sign the data and receiver can electronically verify the signature. We are basically signing the data and verifying the data. Now we have to know that How do we do it! So, now the sender uses a private key to sign the data and the receiver use the public key of the sender to verify the data. When a sender sends something to the receiver, the sender will sign the message using a private key. When the receiver gets the message, they use the sender’s public key to see the message. That is how validation happens.
authentication exchange is when two entities exchange messages to prove their identity to each other. For example, someone has a secret that only she supposed to know. This is how they are basically exchanging their authentication.
Then traffic padding. Traffic padding means inserting some bogus data into the data traffic in order too thwart the adversary’s attempt or diveert the adversity from using traffic analysis.
Routing control isthe process of selecting and continuously changing the different available routes between the sender and receiver to prevent the attacker from using each particular routes. Basically, it means that we continuously change the available routes between the sender of our message and the receiver. So no attacker can listen the message.
Now we have notarization. This means selecting a third trusted party to control the communication between two entities.

And last but not least, access control. Which means the user has access to the data or resources owned by a system. Examples are password pin.

Leave a Comment

Your email address will not be published. Required fields are marked *