Description of cryptography and ciphers (Describe cryptography and ciphers)

Description of Cryptography and Ciphers

Description of Cryptography and Ciphers



Cryptography: Cryptography is generally the process of converting plaintext into plaintext and vice versa.



It is a method of storing and transmitting data of a fixed size, so that only the data can be read and processed. Cryptography is not only used to protect data from theft or alteration, it can also be used for user authentication.



Features of Modern Cryptography

  • Confidentiality - No one else can understand the information.
  • Integrity - Data cannot be altered.
  • Non-repudiation – The sender cannot repudiate his action at a later stage of transmission.
  • Authentication – Sender and receiver can be verified. Cryptography is used in various types of banking transaction cards, computer passwords and e-commerce transactions.


Generally three types of cryptographic techniques are used,

namely

  • Symmetric key cryptography
  • Public key cryptography
  • Hash function

Cipher: A cipher is an algorithm for encrypting and decrypting data. It is also called symmetric key encryption and secret key encryption. It is used in plaintext to get the ciphertext. With symmetric algorithms, the same cipher and key are used between encryption data.

Cipher transforms the original data. Converts plaintext characters to ciphertext. This is the unreadable output of the encryption algorithm. Earlier two types of ciphers were used for conversion. One is the transposition cipher, which retains all the original data bits within the byte but shuffles their order, and the second is the substitution cipher, which replaces certain data sequences with specific data sequences.

Modern ciphers communicate privately with the Transport Layer Security (TLS) protocol and many other networking protocols that offer network traffic encryption. Many communication methods, including telephones, digital televisions, and ATMs, rely on ciphers to maintain security and privacy.

Ciphers can be designed to encrypt or decrypt bits in a stream, or they can process ciphertext in uniform blocks of a fixed number of bits. Modern cipher implementations rely on a cipher algorithm and a secret key. Cipher algorithms are used to modify and encrypt data. Ciphers use long keys and measure in bits, which can be strong against brute force attacks, although cipher strength is not always dependent on key length.

Experts note that key lengths ranging from at least 128 bits to 1024 bits or more can be used to configure modern ciphers. A key is an essential part of a cipher algorithm.

So in the world of encryption what is kept secret but the algorithm is not necessarily kept secret.

Strong ciphers are designed in such a way that one who knows the algorithm but cannot decipher a ciphertext due to lack of appropriate knowledge.

Popular posts from this blog

Baitul Hikmah: The Unforgettable Library of Baghdad

Five Writers of the Golden Age of Russia

The Story of the Fire Mummy: The Process That Begins Before Death