NEW!Enroll into our new free Ethical Hacking Course on YT. Check Now
Encryption & DecryptionTechnology

Cryptography Explained – Introduction, Types & Get Free Course

3 Mins read

What is the meaning of Cryptography?

Cryptography is the branch of Computer Science that deals with applying mathematical techniques to information security to maintain authentication, integrity, and confidentiality of data.  It also prevents and detects malicious activities.

Services of Cryptography:

Cryptography is mainly used to provide the following services:

  • Confidentiality is a service provided by the cryptography to make sure that data is secure and to make sure that the data is accessible to those who have access to it.
  • Data Integrity is another service from cryptography that is useful in detecting data manipulation by unauthorized parties. Manipulation of data may be insertion, deletion or modification of data.
  • Authentication, a service from cryptography that is useful in the identification of entities transferring data and is responsible for the safe transfer of right data.
  • Non-repudiation is a service from cryptography that prevents entities from denying previous commitments or actions.

Terms used in Cryptography:

To understand the cryptography, the knowledge on following terms is useful.

  • Plain Text: Original Message is known as plain text
  • Cipher Text: Modification or encoding of the original message using some mathematical techniques is known as ciphertext.
  • Encryption: Process of converting plaintext to ciphertext is known as Encryption.
  • Decryption: Process of converting ciphertext to plaintext is known as Decryption.
  • Cryptanalysis: Processing of decrypting a message without any knowledge on the process of encryption is called Cryptanalysis.
  • Cryptology: Areas of Cryptography and Cryptanalysis are together known as Cryptology.

Working of Cryptography:

A cryptographic algorithm is nothing but a mathematical function that is used to encrypt or decrypt data. The cryptographic algorithm is known as cipher. To convert plain text to cipher text, an algorithm is used which may be a number or key. The security of the algorithm depends on the strength of the key used. Cryptography algorithm, keys, and protocols that are used for cryptography are together called Cryptosystem.

Example of algorithm:

A simple example of the cryptographic algorithm is Caesar Cipher that uses simple mathematical operation for encryption and decryption.

Let us represent the list of alphabets with numbers from 0-25. Here, the key is the number. Choose a key between 1-25.
Let us take Sample plain text as “Hello World” and the key is 3. For example, alphabet A is represented as D which is obtained by shifting right to the 3rd letter as the key is 3.The cipher for plain text “Hello World” is “Khoor Zruog”. In the Decryption process, the shifting is done to the left side.

Types of  Algorithms:

There are various algorithms used for cryptography. Some of them are as below:

  1. Symmetric Algorithm: Cryptographic algorithm that uses the same key for both encryption and decryption are Symmetric algorithms.
  2. Asymmetric algorithms: It is also known as Public Key Cryptography. These algorithms use a pair of mathematically related keys for encryption & decryption known as a public key and private key. Public keys are shared but private keys are kept secret.

Examples of Symmetric Algorithms:

  1. Data Encryption Standard(DES): An Cryptographic algorithm that uses 56 bit key for encryption and decryption which is widely used
  2. Advanced Encryption Standard(AES): Cryptographic algorithm more secure than DES and uses keys of length of 128, 192 and 256 bits
  3. International Data Encryption Algorithm: An Cryptographic algorithm that uses the 128-bit key that has its application in Open PGP also.

Examples of Asymmetric Algorithms:

  • Diffie Hellman is an Asymmetric algorithm that provides secure encrypted communication by exchanging keys using physical channel
  • RSA(Rivet-Shammir-Adlemen) is another Asymmetric algorithm that uses keys based on the factorization of prime numbers concept
  • Elliptic Curve is a famous and widely used Asymmetric algorithm that is based on the concept of elliptic curves over finite fields.

Free Resources to Learn Cryptography:

  • Udemy has an extensive amount of resources to learn about cryptography and its implementation using various programming languages.
  • Cybrary also provides a wide range of courses on Cryptography.

If You Liked This Article then Please support us by sharing this article on WhatsApp and Facebook.
And, please use comment section and let us know if you need any Career Advice. Feel free to ask your questions.

90 posts

About author
Troubleshooter @Google Ops | YouTuber (60k subs) | Creator of this website (i.e. The Techrix) Passionate about InfoSec & CTFs | Exploring tech's frontiers with curiosity and creativity."
Articles
Related posts
Technology

Exploring Deepfake Tools: A Comprehensive Guide to Creating Convincing Fabrications

2 Mins read
In the rapidly evolving landscape of digital technology, the emergence of deepfake tools has revolutionized the way multimedia content is created and…
Technology

Rise of Deepfakes: Can You Trust What You See?

3 Mins read
In an era characterized by rapid technological advancements, the rise of deepfakes and deepfake technologies has ushered in a new dimension of…
Technology

Unveiling the Dark Side of Smart Devices and Smartphones: Privacy & Security Concerns

3 Mins read
In today’s digitally-driven world, smart devices and smartphones have seamlessly integrated into our daily lives, revolutionizing the way we communicate, work, and…
Subscribe for Ask-Me-Anything Sessions

Monthly live Q&A sessions with cybersecurity professionals where subscribers can ask their burning questions.

Leave a Reply

Your email address will not be published. Required fields are marked *