Skip to content
  • Home
  • About
  • Disclaimer page
  • Forensics
    • Cryptography
    • Ethical Hacking
    • Careers
    • Resources
  • Blog
  • Privacy Policy
  • Contact

  • Home
  • About
  • Disclaimer page
  • Forensics
    • Cryptography
    • Ethical Hacking
    • Careers
    • Resources
  • Blog
  • Privacy Policy
  • Contact
crypto
Cryptography

WHAT IS CRYPTOGRAPHY & TYPES OF CRYPTOGRAPHY

August 4, 2018
password
Cryptography

Hard coded passwords Threat

penetration
Forensics

What is Penetration Testing

malware
Ethical Hacking

Malicious macros and Trickbot trojan

wireless
Careers

Network Associates unveils wireless strategy

Breaking News

crypto Cryptography
August 4, 2018

WHAT IS CRYPTOGRAPHY & TYPES OF CRYPTOGRAPHY

Cryptography has become an excellent way to provide secure communication in the…

password Cryptography
August 3, 2018

Hard coded passwords Threat

penetration Forensics
August 3, 2018

What is Penetration Testing

malware Ethical Hacking
August 3, 2018

Malicious macros and Trickbot trojan

Latest Post

crypto

WHAT IS CRYPTOGRAPHY & TYPES OF CRYPTOGRAPHY

Cryptography has become an excellent way to provide secure communication in the presence of dangerous or malicious third parties known …
Read More
password

Hard coded passwords Threat

…
Read More
penetration

What is Penetration Testing

…
Read More
malware

Malicious macros and Trickbot trojan

…
Read More

Blog

crypto

WHAT IS CRYPTOGRAPHY & TYPES OF CRYPTOGRAPHY

Cryptography has become an excellent way to provide secure communication in the presence of dangerous or malicious third parties known as adversaries. Cryptography mainly consists of encryption which uses an algorithm and a key to change a given input, which is usually just plain text into an encrypted output. This encrypted output is known as ciphertext. A given algorithm will always turn a given input into the same encrypted ciphertext if given the same key.

An algorithm is considered to be secure if the attacker cannot determine any part of the plaintext or the key if given the ciphertext. Further, they should be unable to figure out the content of the key using a large number of ciphertext/plaintext combinations using the key. This is typically done in a forceful deciphering method known as brute-force attacks where the adversary constantly taxes the system trying various combinations of the key until the right key is encountered.

There are different types of cryptographic methods available to encrypt data. The main two methods are symmetric cryptography and asymmetric cryptography.

cybersecurity

Symmetric Cryptography: In symmetric cryptography, the same key is used in both encryption and decryption. In this case, both the sender and receiver should already have a shared key. The problem came from the key distribution which was the main reason that asymmetric cryptography was developed.

Asymmetric Cryptography: In this type of cryptography, there are two separate keys used for encryption and decryption. In this system, every user in this system has a private and a public key. The private key is kept secret at all times and the public key can be distributed freely among any number of people. This is because the data that is encrypted with the public key can only be deciphered using the corresponding private key.

The main disadvantages of asymmetric cryptography are that it is very slow and can only encrypt pieces of data that are smaller than the key ( usually smaller than 2048 bits or smaller) while symmetric cryptography is very fast and used for encrypting large amounts of data like databases. A good compromise is to use both types, symmetric being used to encrypt large amounts of data and then asymmetric is used to encrypt the key that was used to encrypt the data.

There are many instances where the communication has to be secure and it should be able to give certain assurances like confidentiality, integrity and availability of data. In processes that involve sensitive information like bank transfers, your data must not fall into the wrong hands. It is in these cases that encryption and cryptography, in general, are very important.

Recent Posts

  • WHAT IS CRYPTOGRAPHY & TYPES OF CRYPTOGRAPHY
  • Hard coded passwords Threat
  • What is Penetration Testing
  • Malicious macros and Trickbot trojan
  • Network Associates unveils wireless strategy

Steve Martin

 

Helping you have an effortless, carefree online experience is what we work towards. We understand the importance of cybersecurity and protecting your online identity, and we take effective measures to combat all kinds of cyber threats.
 

UPCOMING EVENTS

crypto

WHAT IS CRYPTOGRAPHY & TYPES OF CRYPTOGRAPHY

password

Hard coded passwords Threat

penetration

What is Penetration Testing

  • Legal pages
  • Facebook
  • Twitter
Copyright © securitytechnet.com All rights reserved.
Magazine Point by Axle Themes