anitsh / til

Today I Learn (til) - Github `Issues` used as daily learning management system for taking notes and storing resource links.
https://anitshrestha.com.np
MIT License
76 stars 11 forks source link

Cryptography #43

Open anitsh opened 4 years ago

anitsh commented 4 years ago

Cryptography

Resources:

anitsh commented 4 years ago

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden. It is closely associated to encryption, which is the act of scrambling ordinary text into what's known as ciphertext and then back again upon arrival. In addition, cryptography also covers the obfuscation of information in images using techniques such as microdots or merging. Ancient Egyptians were known to use these methods in complex hieroglyphics, and Roman Emperor Julius Caesar is credited with using one of the first modern ciphers.

Various cryptography techniques has been developed to provides the data security, to ensures that the data transferred between communication parties are confidential, not modified by unauthorized party, to prevent hackers from accessing and using their information. Caesar cipher, monoalphabetic cipher, homophonic substitution cipher, Polyalphabetic Cipher, Playfair cipher, rail fence, One time pad, hill cipher are some of the examples of cryptography techniques

Cryptography deals with various security principles which are as follows:

Cryptography System image

anitsh commented 4 years ago

Types Of Cryptography

Simple Codes

This category is any way of writing a message by side that it is difficult for anyone else to read. That involves writing stuff in another alphabet. Here we can see that Icelandic runes and IPA, as well as another niche, built alphabets such as the Deseret Alphabet.

image In this, we can use language to code. We have looked into the creation of created languages such as Elvish and Esperanto. Chester Naz and Judith Schiess Avila’s book Code Talker is a book that explains how the Navajo language had been used as a code in the Second World War and never was cracked into extremely intense conditions. If Navajo had no words for a particular notion, the code speakers chose a term instead. The Navajo word for ‘ hummingbird, ‘ for example, had become a fighter plane, and ‘ iron hat ‘ was Germany.

Symmetric Encryption

Symmetrical encryption is a type of encryption that is used for the encryption and decryption of electronic data by just one key (a secret key). Substitution ciphers are symmetrical encryption techniques, but modern symmetric encryption can be much more complicated.
Data are converted to a method that cannot be understood by anyone without a secret key to decrypt it using symmetrical encryption algorithms.
Symmetric encryption is an old algorithm but it is faster and efficient than asymmetric encryption. Because of great performance and fast speed of symmetric as compare to asymmetric encryption.
Whereas Symmetric key cryptography involves the usage of the same key for encryption and decryption. While Asymmetric key cryptography involves the usage of one key for encryption and another different key for decryption.
Symmetric encryption is typical for big quantities of information, e.g. for database encryption, in bulk encryption. In the case of a database, the secret key can only be encrypted or decrypted by the database itself.

We can see the working of Symmetric encryption in the picture given below: image image

Two kinds of symmetrical encryption algorithms are available:

Asymmetric Encryption

Asymmetric encryption is also called public-key cryptography. Asymmetric key encryption helps to resolve a key exchange problem of symmetric key Cryptography. In Asymmetric encryption, Two keys are used to encrypt plain text in asymmetrical encryption. Through the internet or big network, the secret keys are exchanged. It is necessary to notice that anyone with a secret key can decrypt the message, so asymmetric encryption is using two corresponding keys to increase safety. Anyone who wishes to send you a message will have a public key freely accessible but the second private key is held the secret for you to understand you only. A message encrypted with a public key can be decoded with a private key. A message encrypted with a private key can also be decrypted with a public key.

We can see the working of Asymmetric encryption in the picture given below: image image

Steganography

Steganography is a technique that facilitates the hiring of a message that is to be kept secret inside other messages. Earlier, people used methods to hide messages such as invisible ink, minute variations, etc. But in an age of technology, Steganography is a technique to conceal data that can be the file, message, image, etc inside other files, message or images.

Hashing

Hashing is the cryptographic technique that converts data which can be any form into a unique string. Regardless of size or type, any data can be hashed using a hashing algorithm. It takes data of random length and converts it into fixed hashed value. Hashing is different from other encryption methods because, in hashing, encryption cannot be reversed that is cannot be decrypted using keys. MD5, SHA1, SHA 256 are the widely used hashing algorithms.

anitsh commented 4 years ago

Differences Between Cryptography and Encryption