CRYPTOGRAPHY
Introduction
All the secrets and strategies must be protected in order to be at faith place, within the nation and all our the world different centers have things which are secret and are important for the company
So all that issue must be kept at good situation. Through studying Cryptography we can be able to keep the important issues secret.
Cryptography is the study of ways to convert the information from its normal, comprehensible form into an obscured guise. Also in modern time cryptography is considered a branch of mathematics and computer science and is related closely with information theory and computer security. These is used in application present in technologically
The technology was used by Egyptians some 4000 years ago to 20th c where it played a crucial role in the outcome of both world wars, In 20th c world of computer network message are digitally encrypted on the sending side and decrypted on the receiving side using the cryptographic services and algorithms
Component of cryptograph
There are two basic cryptograph which are, An algorithm (or cryptographic method) and Keys.
Algorithms are complex mathematical formulae, and Keys are string of bits. In order the to be understood both communicator must use the same algorithm and also they must use the same key.
There are several ways of classifying cryptograph; these are Secret key system and Public key system.
Secret key a single key is used for both encryption and decryption that is both of the communicator have the same kind of key.
Public key here there are different key which can be used that is one key for encryption and another key for decryption. Public key is modern as compared to secret key, digital signature capability.
Also cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, in all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext.
Uses of cryptography
Integrity assuring the receiver of that message received at right way not altered in any way from the original.
Non-repudiation a mechanism to prove that the sender really sent this message.
Privacy/confidentially assuring that no one can read the message except the intended receiver.
No comments:
Post a Comment