It is a method of securing the information and communication by encrypting and decrypting the actual data. It is used because to achieve-
Data security
Integrity
Privacy
Secure transactions such as- related to finance
data security
Types of Cryptography:
Symmetric
Asymmetric
Hash-fucntion
Symmetric are- AES, DES,3DES and blowfish
Asymmetric are- SHA-256,MD5 and SHA-3
Hash functions- SHA256, MD5 and SHA-3
Symmetric- In this, cryptography data is encrypted and decrypted to secret code.
Types of symmetric key-
Data Encryption Standard (DES): Data Encryption Standard, or DES
for short, is a symmetric key encryption technique that was extensively
utilized for data security in the past. The U.S. National Institute of
Standards and Technology (NIST) approved it as a federal standard
for encrypting private but unclassified government data. IBM created it
in the early 1970s. The first commonly used and publicly available
encryption algorithm was called DES.
DES is a block Cipher Algorithm
Encodes plaintext in 64-bit chunks
DES employs a complex process of substitution and permutation
operations, making it resistant to various cryptographic attacks.
3DES: Triple Data Encryption Standard (3DES), also known as TDEA
or Triple DES, is a symmetric key encryption algorithm that was
developed as an enhancement to the Data Encryption Standard
(DES). It provides increased security by applying the DES algorithm
three times in succession with different keys. This triple application of
the DES algorithm significantly increases the key length and security
compared to the original DES.
Asymmetric- In this, two keys are used, one public and one private key.
types are-
RSA-The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as the internet.
Elliptic Curve Cryptography: (ECC) is a key-based technique for encrypting data. ECC focuses on pairs of public and private keys for decryption and encryption of web traffic. ECC is frequently discussed in the context of the Rivest–Shamir–Adleman (RSA) cryptographic algorithm.
Comentários