Skip to main content

CRYPTOGRAPHY | Encryption and Decryption

Cryptography: The Art of Hiding


https://www.google.com/url?sa=i&source=images&cd=&ved=2ahUKEwjVuPqa2orkAhWMV30KHa63ClcQjRx6BAgBEAQ&url=https%3A%2F%2Fgirlstalkmath.com%2F2017%2F06%2F30%2Felliptic-curve-cryptography%2F&psig=AOvVaw1yuCKoTk6M3KHZ85YKhJyO&ust=1566158724315235
Cryptography can be defined as a method of protecting the digitally shared information between the users. In simple words, it helps us to protect our 'confidentiality' or 'privacy'.
The word cryptography consists of two words, 'crypt' which stands for 'hidden' and 'graphy' which stands for 'writing'.
Cryptography is basically related to the study of 'cryptology' and 'cryptoanalysis'. It includes various techniques such as microdot, combining words with images, merging images in audios and other different methods to maintain your confidentiality.
If we talk cryptography in terms of information security it is more often associated with scrambling or converting the plaintext into an encrypted text (or ciphertext ) and again decrypting (or decipher ) the encrypted text into the plain text. When we talk about cryptography we will always come across the two words, i.e, Encryption and Decryption. So let us talk about it.

Encryption and Decryption:

Encryption can be referred to as the method of converting plain text ( common language ) into a ciphertext ( an encrypted text which cannot be read by unauthorized access ) and decryption can be referred to as the method of converting the ciphertext back into the plain text ( i.e, decipher ). For encryption, we use a cipher, which is basically an algorithm (set of instructions) and the individual having the encryption key can only decrypt the encrypted text. 

Types of Encryption:

There are basically two major types of encryption :
1)  Symmetric Encryption
2) Asymmetric Encryption

https://www.ssl2buy.com/wiki/wp-content/uploads/2015/12/Symmetric-Encryption.pngSymmetric Encryption is an encryption method that consists of only one key which can be used for both, encryption of the plain text as well as decryption of the ciphertext. It is one of the oldest methods of encryption which involves only one key (i.e, public key). Some of the popular symmetric encryption methods are blowfishDESAES, etc. The major disadvantage of symmetric encryption is that all the users associated with this have to share the key among them to access the data.

Asymmetric Encryption is an encryption method that involves tho way key systems. In this type of method, the plain text is encrypted by a public key and it can only be decrypted by a private (secret key) key which is only known to the receiver. This method is a relatively new method than the symmetrical method. Some of the popular asymmetrical methods are RSADSA, etc. The asymmetric Encryption method is basically used in our day-to-day communication channels, especially over the internet.

So there was a short introduction about cryptography, encryption and decryption, and types of encryption. If you want detailed information on Cryptography please let me know through comments.

Comments

Popular posts from this blog

Containerization Within Container

How to Launch Container within Container? In this article we will see how we can use the Concepts of Docker to achieve Containerization within Container. To launch another container within a running container is quite a tedious task but in this article I will show you how easily you can achieve this by applying right concepts. In this article I will be using few concepts of docker like Dockerfile , mounting volume , mounting port and few basic docker commands . Before starting with the container we need to make sure that Docker is installed and configured in our system. If docker is not configured then you can use my automated script which I made for installing and configuring docker from my GitHub Repository . After setting up with docker now we need launch a container so that we can launch another container inside it to achieve Containerization within container. There are two ways to launch container. By using docker pull command By using Dockerfile In this ...

How to Grab Someone's IP Address ?

How to Grab Anyone's IP Address? IP Address is abbreviated as Internet Protocol Address which is a unique address for all the users present on the internet. Whenever we visit any domain or click any link /images on the internet, our public IP address is being shared that source. But what if, we want someone’s IP address intentionally or we want to track someone. So in this blog I will show you how you can easily grab anyone’s IP Address just within a few steps. To grab IP address I will be using an online Web Application named Grabify IP Logger . It is an online tool that is used for IP Lookup . Before beginning with the tool it is recommended to use browser proxy or VPN . Here we have used browser proxy as you can see in the top-right corner in the image for accessing Grabify. Now we need to register ourselves in this application to use it. After registration, we have to log in to the application. After registration and login into the application, we are ready to use it. To grab...

Linux , it's uniqueness and it's distributions.

What is Linux ? Linux is a open source  Operating System which is  modelled on  Unix. Basically Linux is packaged in a form known as a linux distribution for both desktop and server use. It is a family of free and open source software operating systems build on   linux kernal.  How it is different than other OS ? Linux , in simple words is a Operating System as like other O.S such as Windows , iOS , android , etc. which provides you a medium to communicate with machines. However there is a major difference between linux and other O.S .Linux is a open source software. The code in which it is written is accessible to everyone so that user can filter it according to their needs.  What is Linux Distribution ?    Linux has a number of versions  to suits any kind of user. Theses different versions of linux are known as linux distribution ( distros ). Every version of linux can be downloaded for free and can ...