what is cryptography and its types, symmetric key, asymmetric key, RSA, DES, Attacks in cryptography
What is Cryptography?
Cryptography is a study in which the process includes the plain text is given to the encryption algorithm. The job of the encryption algorithm converts plain text into ciphertext using a technique. This ciphertext can be transmitted on the internet and it will be received at the receiver side. Then the receiver will give ciphertext to the decryption algorithm which is opposite to the encryption algorithm. it converts into original plain text. To avoid data breach instances and provide basic security.
“Cryptography allows for the secure transmission of digital data between willing parties. Cryptography is used to safeguard secrets, secure classified information, and sensitive information from fraudulent activity, among other things”
Encryption is a fundamental component of cryptography
as a jumble of data using various algorithms. Data encryption is a method of
undoing the work done by encrypting the data so that it can be read.
In this entire process, two algorithms involved
encryption and decryption algorithm. The role of the encryption algorithm is to
convert the plain text into ciphertext. The job of the decryption algorithm
is to convert ciphertext back to its plain text.
In the whole process, encryption or decryption algorithm. There will be two inputs. The first input is text and the second is the key that is the most important critical information and it should be kept secret. The encryption algorithm is generally public i.e. attackers may know the encryption algorithm used in the ciphertext. But real security is using a key concept. Only a cipher is sent over the internet to the other side then no one can understand the information except the receiver.
Example: Authentication and digital signature in
public-key cryptography.
In the entire process if the same key is used for both
the encryption and decryption, this cipher model is what we call a symmetric cipher
model. Because the sender and receiver using the same key and the
key must be known only to sender and receiver. If the sender and receiver using
a pair of keys then we call it an asymmetric cipher model.
Types of Cryptography
·
Symmetric Key Cryptography (Private
Key Cryptography)
·
Asymmetric Key Cryptography (Public
Key Cryptography)
Symmetric Key Cryptography (Private Key Cryptography)
It is the type of encryption where the same key (secret key) is used for both the encryption and decryption algorithm and no one knows about the key. In other words, if the sender uses a private key for encryption and if the same symmetric key is used for decrypting. The message is sent by the receiver to convert back to the original text. Then it is symmetric cryptography which is also called private key cryptography and the best-known encryption technique.
Asymmetric Key Cryptography (Public Key Cryptography)
This type of encryption consists of two keys. One key is the public key (which is announced to the public) and the other key is the private key (used by the receiver). These keys are generated by the mathematical algorithms to deal with these techniques.
Encryption scheme
Unconditionally secure:
An encryption scheme
is said to be unconditionally secure if the ciphertext is generated by
this algorithm. The scheme does not contain enough information to determine the corresponding plain text. So the attacker is not able to find out the
correct plain text.
Computationally secure:
It depends on two
factors. If the encryption scheme is said to be computationally secure if the
cost of breaking the cipher exceeds the value of encrypted information i.e. ciphertext
and the time requirements for the attacker exceed the useful lifetime of the information.
Digital Signatures
A digital signature
is equal to a handwritten signature. It is an electronic verification
along with the message of the sender. Digital signatures are commonly used for
sending secure emails and financial transactions. The digital signature serves
three purposes. Authentication, non-repudiation, and integrity.
Cryptography Algorithms
These are means of
altering data from a readable form to a protected form and back to the readable
form. Cryptographic algorithms are used for important tasks such as data
encryption, authentication, and digital signatures.
RSA (Rivert-Shamir-Adleman) Algorithm
RSA is an asymmetric cryptographic algorithm. This works on a block cipher concept that converts plain text into ciphertext and vice versa at the receiver side.
Here (e, n) is the public key used for
encryption, and (d, n) is the private key used for decryption.
The RSA algorithm has the limitation of being quite
slow. In cases in which large volumes of data must be authenticated. Data is
routed through a middle-man that is vulnerable to attack.
DES Algorithm
Data Encryption Standard uses the block cipher method for encryption and decryption. DES is the landmark in cryptographic algorithms. It works based on Fiesta Cipher Structure. DES operates on the plain text of 64-bit and returns ciphertext of the same size. There are two steps in the DES algorithm.
Sub-key
generation and
Attacks in Cryptography
Types of Attacks
Active attack:
In this type of attack, the intruder can
alter the private data.
Snooping is also
known as message content leakage. This is a non-aggressive attack. The intruder
can read the message, which harms the security goal of confidentiality.
Passive attack:
In this attack, the intruder can only see the
private data but hardly make any changes to it. A Passive attack is more
dangerous.
Masquerade: The intruder will try to
gain as much access to the system computer as possible. An active attack that
threatens the security system.
Brute-force Attack:
A brute force attack occurs when hackers use computers to feedback loop over
each letter in a character set systematically. A character set can consist of
letters, numbers, symbols, or anything else the hacker desire. In the most
general terms, a brute force attack is a guessing possible combinations. An error that attempts all possible correct passwords is discovered.
Dictation Attack: This
is a quick and easy password attack. The hackers generate thousands of
candidate digests and their pre-matched plain text passwords using a
dictionary. These candidate digits are compared to those in a stolen digest file
by hackers. If a match is found, they are given the password.
Cryptography in Cybersecurity
Both cybersecurity and cryptography are interrelated. Cryptography is now being used to hold confidential data, including private passwords, secure online. Cryptography is now used by cybersecurity experts to foster innovation, ciphertext, as well as other protective measures that enforce. But also insulate business and personal information.



COMMENTS