Cryptography | Types of Cryptography

what is cryptography and its types, symmetric key, asymmetric key, RSA, DES, Attacks in cryptography

cryptography and its types

What is Cryptography?

Cryptography is a study in which the process includes the plain text is given to the encryption algorithm. The job of the encryption algorithm converts plain text into ciphertext using a technique. This ciphertext can be transmitted on the internet and it will be received at the receiver side. Then the receiver will give ciphertext to the decryption algorithm which is opposite to the encryption algorithm. it converts into original plain text. To avoid data breach instances and provide basic security.

“Cryptography allows for the secure transmission of digital data between willing parties. Cryptography is used to safeguard secrets, secure classified information, and sensitive information from fraudulent activity, among other things”

Encryption is a fundamental component of cryptography as a jumble of data using various algorithms. Data encryption is a method of undoing the work done by encrypting the data so that it can be read.

In this entire process, two algorithms involved encryption and decryption algorithm. The role of the encryption algorithm is to convert the plain text into ciphertext. The job of the decryption algorithm is to convert ciphertext back to its plain text.

In the whole process, encryption or decryption algorithm. There will be two inputs. The first input is text and the second is the key that is the most important critical information and it should be kept secret. The encryption algorithm is generally public i.e. attackers may know the encryption algorithm used in the ciphertext. But real security is using a key concept. Only a cipher is sent over the internet to the other side then no one can understand the information except the receiver.

Example: Authentication and digital signature in public-key cryptography.

In the entire process if the same key is used for both the encryption and decryption, this cipher model is what we call a symmetric cipher model. Because the sender and receiver using the same key and the key must be known only to sender and receiver. If the sender and receiver using a pair of keys then we call it an asymmetric cipher model.

Types of Cryptography

·       Symmetric Key Cryptography (Private Key Cryptography)

·       Asymmetric Key Cryptography (Public Key Cryptography)


Symmetric Key Cryptography (Private Key Cryptography)

It is the type of encryption where the same key (secret key) is used for both the encryption and decryption algorithm and no one knows about the key. In other words, if the sender uses a private key for encryption and if the same symmetric key is used for decrypting. The message is sent by the receiver to convert back to the original text. Then it is symmetric cryptography which is also called private key cryptography and the best-known encryption technique.

Symmetric Key Cryptography

Asymmetric Key Cryptography (Public Key Cryptography)

This type of encryption consists of two keys. One key is the public key (which is announced to the public) and the other key is the private key (used by the receiver). These keys are generated by the mathematical algorithms to deal with these techniques.

Assymmetric Key Cryptography


Encryption scheme

Unconditionally secure:

An encryption scheme is said to be unconditionally secure if the ciphertext is generated by this algorithm. The scheme does not contain enough information to determine the corresponding plain text. So the attacker is not able to find out the correct plain text.

Computationally secure:

It depends on two factors. If the encryption scheme is said to be computationally secure if the cost of breaking the cipher exceeds the value of encrypted information i.e. ciphertext and the time requirements for the attacker exceed the useful lifetime of the information.


Digital Signatures

A digital signature is equal to a handwritten signature. It is an electronic verification along with the message of the sender. Digital signatures are commonly used for sending secure emails and financial transactions. The digital signature serves three purposes. Authentication, non-repudiation, and integrity.


Cryptography Algorithms

These are means of altering data from a readable form to a protected form and back to the readable form. Cryptographic algorithms are used for important tasks such as data encryption, authentication, and digital signatures.

RSA (Rivert-Shamir-Adleman) Algorithm

RSA is an asymmetric cryptographic algorithm. This works on a block cipher concept that converts plain text into ciphertext and vice versa at the receiver side.

RSA algorithm

Here (e, n) is the public key used for encryption, and (d, n) is the private key used for decryption.

The RSA algorithm has the limitation of being quite slow. In cases in which large volumes of data must be authenticated. Data is routed through a middle-man that is vulnerable to attack.

DES Algorithm

Data Encryption Standard uses the block cipher method for encryption and decryption. DES is the landmark in cryptographic algorithms. It works based on Fiesta Cipher Structure. DES operates on the plain text of 64-bit and returns ciphertext of the same size. There are two steps in the DES algorithm.

 Sub-key generation and Encryption


Attacks in Cryptography

Types of Attacks

Active attack:

In this type of attack, the intruder can alter the private data.

Snooping is also known as message content leakage. This is a non-aggressive attack. The intruder can read the message, which harms the security goal of confidentiality.

Passive attack:

In this attack, the intruder can only see the private data but hardly make any changes to it. A Passive attack is more dangerous.

Masquerade:  The intruder will try to gain as much access to the system computer as possible. An active attack that threatens the security system.

Brute-force Attack: A brute force attack occurs when hackers use computers to feedback loop over each letter in a character set systematically. A character set can consist of letters, numbers, symbols, or anything else the hacker desire. In the most general terms, a brute force attack is a guessing possible combinations. An error that attempts all possible correct passwords is discovered.

Dictation Attack: This is a quick and easy password attack. The hackers generate thousands of candidate digests and their pre-matched plain text passwords using a dictionary. These candidate digits are compared to those in a stolen digest file by hackers. If a match is found, they are given the password.


Cryptography in Cybersecurity

Both cybersecurity and cryptography are interrelated. Cryptography is now being used to hold confidential data, including private passwords, secure online. Cryptography is now used by cybersecurity experts to foster innovation, ciphertext, as well as other protective measures that enforce. But also insulate business and personal information.

COMMENTS

Name

Artificial Intelligence,16,AWS,2,Big Data,2,Blockchain Technology,3,Cloud computing,9,Computer networks,4,cybersecurity,3,Database,2,Digital Marketing,1,E-commerce,2,Internet of Things,12,Quantum Computing,1,RPA,3,Technology,5,Web Scraping,1,
ltr
item
PS TECHNO BLOG: Cryptography | Types of Cryptography
Cryptography | Types of Cryptography
what is cryptography and its types, symmetric key, asymmetric key, RSA, DES, Attacks in cryptography
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5Y9ugoAEDCv5xGbm2XHbD68NZCzbPl43D7PDHXKwcoaNeStIHoAQpTeCIF_eTvxh29bv3UN6qpH4kzTGUNfGXxUPoomICJB5CbdfXiiiGSn0wY8_S_ewvd0ouH1w9mP65tForbBIjfecz/s320/C+%25287%2529.png
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5Y9ugoAEDCv5xGbm2XHbD68NZCzbPl43D7PDHXKwcoaNeStIHoAQpTeCIF_eTvxh29bv3UN6qpH4kzTGUNfGXxUPoomICJB5CbdfXiiiGSn0wY8_S_ewvd0ouH1w9mP65tForbBIjfecz/s72-c/C+%25287%2529.png
PS TECHNO BLOG
https://pstechnoblog.blogspot.com/2021/07/cryptography-and-its-types.html
https://pstechnoblog.blogspot.com/
https://pstechnoblog.blogspot.com/
https://pstechnoblog.blogspot.com/2021/07/cryptography-and-its-types.html
true
8274238297581439573
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy