Cyber Security / Cryptography in Cyber security

Cryptography

It is a process of converting plain text into cipher / unintelligible text and vice-versa. It protects data from theft or alteration and also used for user authentication.


Encryption

1. It a process of converting plain text into cipher / unintelligible text using Key.
2. All data in SSL transactions is encrypted between the client (browser) and the server (web server) before the data is transferred between the two.


Decryption:
Reverse of encryption is called as Decryption


cryptography and Cryptograpy Types

Cryptography Properties

Cryptography Property Name Details
Confidentiality Information cannot be understood by anyone while in transmission.
Integrity Information cannot be Modified.
Non-repudiation Sender cannot deny his/her intentions in the transmission of the information at a later stage
Authentication Sender and receiver can confirm each other



Types of cryptographic techniques

Cryptograpy Type Details
Symmetric-key Cryptography Both the sender and receiver share a single key.
Public-key cryptography Here two related keys (public and private key) are used. Public key is freely distributed used for encryption and private /secret key used for decryption.
Hash functions. No keys are used in this algorithm but it uses Hash functions to calculate a hash value based on plain text and its length and is used to recover plain text.


Cryptography applications:
Banking transactions, computer passwords, Ecommerce transactions e.t.c.


Home     Back