Cryptography in Cyber Security
"Cryptography in Cyber Security"
One of the oldest and most widely used tools for protecting IT assets is cryptography. Cryptography is used by nearly every business to protect sensitive data and IT infrastructure. So, what exactly is cryptography and how can you use it to improve your security? Simply put, it is a method for rendering compromised information unreadable to adversaries.
This blog will do the following in response to the question, "What is cryptography in cyber security?"
- Break down the two types of cryptography
- Explain different methods of cryptography
- Cryptography and Cryptanalyst
1.Symmetric Key Cryptography
Symmetric cryptography, also known as "secret key cryptography," works by allowing users to share cryptographic keys with one another. Data is encrypted and decrypted with the same key, which is typically shared among users in this approach. The encrypted data should theoretically only be decryptable by an individual with a unique cryptographic key. When protecting the local storage of sensitive data on drives or servers, symmetric cryptography is frequently utilized.
2.Asymmetric Key Cryptography
Asymmetric Cryptography on a different level, asymmetric cryptography is typically used to protect the transmission of sensitive data over public networks. Because its users are required to have two keys, asymmetric cryptography is also known as "public key cryptography." A "public key" is one of the keys, and it can be given to anyone with whom either user communicates. On the other hand, the second key is intended to be kept secret and decrypts the encrypted data.
TERMINOLOGY
We must protect the data
• Information / Data of every individuals having some value as like our personal
assets
• Encryption technique is to hide the information / Data from unauthorized users,
• Protection from unauthorized change
Plaintext:
• Plain Text is Ordinary readable text
• Encrypted in to ciphertext
Ciphertext:
• Ciphertext is the output of encryption performs on plaintext using suitable
techniques
• When plaintext converted into non readable form
• It is also called as scrambled message.
Encryption and Decryption in Cryptography
Encryption
• The Process of converting the plaintext message into cipher text message
• Let P be the Plain text
• E is Encryption
• C is Cipher text
• We Perform encryption on P we get C as
Plain Text(P) ------>ENCRYPTION ------>Text(C)
• C = E(P)
Decryption
• Recovering the plain text message from the encrypted transmission.
• Decryption is the process of transforming cypher text into plain text.
• Let C be the Cipher text
• D is Decryption
• P is Plain text
• We Perform encryption on P we get C as
• Cipher Text (C) ------>DECRYPTION ------> Plain Text (P)
• P = D(C)
Cryptography
• The Word cryptography comes from the Greek word KPVIIT (Secret or Hidden)
• It is art and science of writing secret information and make them non readable
• The field of cryptography is composed of the various encryption schemes.
Cryptanalyst
• The person who studies encryption and decryption methods and finds contents of hidden messages called cryptanalyst
• The process of studying methods of breaking ciphertext message called as cryptanalyst
.jpg)
Nicely explained
ReplyDeleteAll terms are well written !!
ReplyDeletePoint to point explanation 👍
ReplyDeleteExplanation very good
ReplyDeleteAmazing write-up!
ReplyDelete👍🏻👍🏻
ReplyDeleteUseful information
ReplyDeleteCyber Person Good work !!
ReplyDeletequite interesting
ReplyDelete👍
ReplyDeleteBest info
ReplyDeleteFantastic work
ReplyDeleteGreat work 👍
ReplyDelete