top of page
gpd1994

Cryptogrpahy

It is a method of securing the information and communication by encrypting and decrypting the actual data. It is used because to achieve-

  • Data security

  • Integrity

  • Privacy

  • Secure transactions such as- related to finance

  • data security

Types of Cryptography:

  • Symmetric

  • Asymmetric

  • Hash-fucntion

Symmetric are- AES, DES,3DES and blowfish

Asymmetric are- SHA-256,MD5 and SHA-3

Hash functions- SHA256, MD5 and SHA-3

Symmetric- In this, cryptography data is encrypted and decrypted to secret code.

Types of symmetric key-

Data Encryption Standard (DES): Data Encryption Standard, or DES

for short, is a symmetric key encryption technique that was extensively

utilized for data security in the past. The U.S. National Institute of

Standards and Technology (NIST) approved it as a federal standard

for encrypting private but unclassified government data. IBM created it

in the early 1970s. The first commonly used and publicly available

encryption algorithm was called DES.

DES is a block Cipher Algorithm

Encodes plaintext in 64-bit chunks

DES employs a complex process of substitution and permutation

operations, making it resistant to various cryptographic attacks.

3DES: Triple Data Encryption Standard (3DES), also known as TDEA

or Triple DES, is a symmetric key encryption algorithm that was

developed as an enhancement to the Data Encryption Standard

(DES). It provides increased security by applying the DES algorithm

three times in succession with different keys. This triple application of

the DES algorithm significantly increases the key length and security

compared to the original DES.

Asymmetric- In this, two keys are used, one public and one private key.

types are-

RSA-The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as the internet.

Elliptic Curve Cryptography: (ECC) is a key-based technique for encrypting data. ECC focuses on pairs of public and private keys for decryption and encryption of web traffic. ECC is frequently discussed in the context of the Rivest–Shamir–Adleman (RSA) cryptographic algorithm.

2 views0 comments

Recent Posts

See All

Comentários


bottom of page