Skip to main content

CRYPTOGRAPHY | Encryption and Decryption

Cryptography: The Art of Hiding


https://www.google.com/url?sa=i&source=images&cd=&ved=2ahUKEwjVuPqa2orkAhWMV30KHa63ClcQjRx6BAgBEAQ&url=https%3A%2F%2Fgirlstalkmath.com%2F2017%2F06%2F30%2Felliptic-curve-cryptography%2F&psig=AOvVaw1yuCKoTk6M3KHZ85YKhJyO&ust=1566158724315235
Cryptography can be defined as a method of protecting the digitally shared information between the users. In simple words, it helps us to protect our 'confidentiality' or 'privacy'.
The word cryptography consists of two words, 'crypt' which stands for 'hidden' and 'graphy' which stands for 'writing'.
Cryptography is basically related to the study of 'cryptology' and 'cryptoanalysis'. It includes various techniques such as microdot, combining words with images, merging images in audios and other different methods to maintain your confidentiality.
If we talk cryptography in terms of information security it is more often associated with scrambling or converting the plaintext into an encrypted text (or ciphertext ) and again decrypting (or decipher ) the encrypted text into the plain text. When we talk about cryptography we will always come across the two words, i.e, Encryption and Decryption. So let us talk about it.

Encryption and Decryption:

Encryption can be referred to as the method of converting plain text ( common language ) into a ciphertext ( an encrypted text which cannot be read by unauthorized access ) and decryption can be referred to as the method of converting the ciphertext back into the plain text ( i.e, decipher ). For encryption, we use a cipher, which is basically an algorithm (set of instructions) and the individual having the encryption key can only decrypt the encrypted text. 

Types of Encryption:

There are basically two major types of encryption :
1)  Symmetric Encryption
2) Asymmetric Encryption

https://www.ssl2buy.com/wiki/wp-content/uploads/2015/12/Symmetric-Encryption.pngSymmetric Encryption is an encryption method that consists of only one key which can be used for both, encryption of the plain text as well as decryption of the ciphertext. It is one of the oldest methods of encryption which involves only one key (i.e, public key). Some of the popular symmetric encryption methods are blowfishDESAES, etc. The major disadvantage of symmetric encryption is that all the users associated with this have to share the key among them to access the data.

Asymmetric Encryption is an encryption method that involves tho way key systems. In this type of method, the plain text is encrypted by a public key and it can only be decrypted by a private (secret key) key which is only known to the receiver. This method is a relatively new method than the symmetrical method. Some of the popular asymmetrical methods are RSADSA, etc. The asymmetric Encryption method is basically used in our day-to-day communication channels, especially over the internet.

So there was a short introduction about cryptography, encryption and decryption, and types of encryption. If you want detailed information on Cryptography please let me know through comments.

Comments

Popular posts from this blog

Containerization Within Container

How to Launch Container within Container? In this article we will see how we can use the Concepts of Docker to achieve Containerization within Container. To launch another container within a running container is quite a tedious task but in this article I will show you how easily you can achieve this by applying right concepts. In this article I will be using few concepts of docker like Dockerfile , mounting volume , mounting port and few basic docker commands . Before starting with the container we need to make sure that Docker is installed and configured in our system. If docker is not configured then you can use my automated script which I made for installing and configuring docker from my GitHub Repository . After setting up with docker now we need launch a container so that we can launch another container inside it to achieve Containerization within container. There are two ways to launch container. By using docker pull command By using Dockerfile In this ...

How to Grab Someone's IP Address ?

How to Grab Anyone's IP Address? IP Address is abbreviated as Internet Protocol Address which is a unique address for all the users present on the internet. Whenever we visit any domain or click any link /images on the internet, our public IP address is being shared that source. But what if, we want someone’s IP address intentionally or we want to track someone. So in this blog I will show you how you can easily grab anyone’s IP Address just within a few steps. To grab IP address I will be using an online Web Application named Grabify IP Logger . It is an online tool that is used for IP Lookup . Before beginning with the tool it is recommended to use browser proxy or VPN . Here we have used browser proxy as you can see in the top-right corner in the image for accessing Grabify. Now we need to register ourselves in this application to use it. After registration, we have to log in to the application. After registration and login into the application, we are ready to use it. To grab...

Operating System and its Types

What is Operating System(OS)? Whenever a person starts learning about computers or any  computer course the first question he is being asked is what is Operating System (OS)? So the answer is Operating System is basically a computer program that manages all other computer program after being installed into the system from the boot menu . In simple words we can say that Operating System is a software which provides a better medium for users to interact with computers. This was all about Operating System(OS) . Now lets talk about the different types of operating systems that we use in our daily life for personal use and for different other purposes.                                                                                   Linux, Windows, Java, MacOS,...