Cryptography

Mohana Vamsi - Aug 28 - - Dev Community

Understanding Cryptography: Thus, the present invention reveals the Art of Securing Information.

Cryptography can be described as the use of codes with a purpose of protecting information so that the contents of the information can only be viewed by the intended recipients. It is similar to sending a message when only the holder of the key shall be able to unwrap the message in question.

At its core, cryptography involves two main processes: They include encryption and decryption. Encryption is the conversion of plain text into some not so intelligible form and decryption means reverse conversion of this not intelligible form to plain text using the key.

There are two primary types of cryptography: bi-symmetrical as well as non bi-symmetrical plans. In symmetric cryptography one and the same key is used in both the process of encryption and the process of decryption. It is fast and efficient acting, provided which the keys are well protected and distributed. Examples are AES also known as Advanced Encryption Standard and DES also referred to as Data Encryption Standard.

The second category is the asymmetric key cryptography which involves use of a public and private key where the former is used to encrypt the message while the latter is used to decrypt the message. This method is more secure for the key distribution but at the same time it is more complex in terms of computation. RSA and DSA (Digital Signature Algorithm) are few well-known asymmetrical algorithms, while few other modern asymmetrical algorithms are ECC.

Cryptography is one of the key elements of the contemporary cybersecurity that guards such essential activities as online payments, or private messages. It is also a core feature of block chain technology to make sure that the transactions that go through block chain are safe from alteration.

Though, cryptography is not an infallible science or method. As seen with the example of quantum computing, the computer science progress may actually compromise the security of many of the algorithms that we use today. Therefore, the field is dynamic, and researchers try and engineer new techniques in an effort to avoid any possible threats.

In other words, cryptography is simply the means for preserving privacy and security in the unprecedented realm of cyberspace protecting our information against illegitimate access.

. . . . . . . . . . . . . . . . . . . . . . .
Terabox Video Player