You need to login in order to Like
Cryptography: Fundamentals & Uses
By Sandeep Kasalkar
As we know, cryptography is the study of secure communications techniques that allow only the sender and intended recipient of the message to view its contents. With the use of cryptography, data and messages are kept safe and off-limits to possible threats and bad actors. It frequently operates in the background to encrypt and decode data you transmit through email, social media, apps, and website interactions.
Cryptography is broadly divided into two segments, symmetric and asymmetric.
Symmetric cryptography is used in payment apps & card transactions, verifying sender’s signature to confirm identity, etc.
Asymmetric cryptography is used in email communications, SIM card verification, web safety, private keys exchange, etc.
Uses of cryptography:
Confidentiality:
The foundation of cryptography depends on data being protected from outside parties or nefarious enemies. Specific restrictions and standards are included in confidentiality agreements to ensure that information is protected, secure, and only available to specific individuals or within specific contexts.
Encryption:
To preserve the privacy of messages or data transferred between a sender and a receiver, encryption transforms readable material into an unreadable form. Typically, an algorithm is used to do this.
Decryption:
Decryption, which is the opposite of encryption, restores the data to its original, readable form. Usually, a specific key is used for this; this key may be used for both encryption and decryption, or it may require two keys.
Data integrity:
Data integrity can aid in maintaining the precision that data requires to remain consistent and accurate over its entire existence. At any point along the communication chain, data cannot be changed. Everything between the sender and the recipient must remain unbroken.
Authentication:
This is done to confirm that the data or message received came from the intended sender. It is frequently necessary for the sender to prove that they are the true author of the message that the recipient has received.
Non-repudiation:
The capacity to guarantee that the sender of a message or piece of data cannot contest the veracity of its signature. The use of digital signatures can make it impossible for the sender or creator of a communication to retract it.
You need to login in order to Like