Cryptography and its Types - GeeksforGeeks2021.03.17 13:45
Related ArticlesCryptography Introduction Introduction to Crypto-terminologies Cryptography and its Types Playfair Cipher with Examples Hill Cipher Vigenère Cipher Caesar Cipher in Cryptography Substitution Cipher Keyword Cipher Difference between Monoalphabetic Cipher and Polyalphabetic Cipher Difference between Block Cipher and Stream Cipher Block Cipher modes of Operation Data encryption standard (DES) | Set 1 Difference between AES and DES ciphers RSA Algorithm in Cryptography Implementation of Diffie-Hellman Algorithm Java Implementation of Deffi-Hellman Algorithm between Client and Server Socket Programming in Java Introducing Threads in Socket Programming in Java Multi-threaded chat Application in Java | Set 1 (Server Side Programming) Multi-threaded Chat Application in Java | Set 2 (Client Side Programming) A Group chat application in Java Generating Password and OTP in Java Layers of OSI Model TCP/IP Model Basics of Computer Networking Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) TCP Server-Client implementation in C Types of Transmission Media Cryptography and its Types Last Updated : 08 Jan, 2020
Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”.
In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions.
Techniques used For Cryptography:
In today’s age of computers cryptography is often associated with the process where an ordinary plain text is converted to cipher text which is the text made such that intended receiver of the text can only decode it and hence this process is known as encryption. The process of conversion of cipher text to plain text this is known as decryption.
Features Of Cryptography are as follows:Confidentiality:
Information can only be accessed by the person for whom it is intended and no other person except him can access it. Integrity:
Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected. Non-repudiation:
The creator/sender of information cannot deny his or her intention to send information at later stage. Authentication:
The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed.
Types Of Cryptography:
In general there are three types Of cryptography:
Symmetric Key Cryptography:
It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is Data Encryption System(DES). Hash Functions:
There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords. Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.My Personal Notes arrow_drop_up Save favorite_border Like first_page Previous Introduction to Crypto-terminologies Next last_page Playfair Cipher with Examples Recommended Articles Page : Classical Cryptography and Quantum Cryptography 29, Apr 19 Custom Building Cryptography Algorithms (Hybrid Cryptography) 06, Sep 18 Differences between Classical and Quantum Cryptography 29, Apr 19 Difference between Steganography and Cryptography 21, May 19 Cryptography and Network Security Principles 13, Feb 20 Difference between Cryptography and Cryptology 17, May 20 Difference between Encryption and Cryptography 05, Feb 21 Difference between Cryptography and Cyber Security 05, Feb 21 Caesar Cipher in Cryptography 02, Jun 16 The CIA triad in Cryptography 15, Jan 18 Cryptography Introduction 02, Nov 18 Image Steganography in Cryptography 09, Apr 18 DNA Cryptography 04, May 18 Birthday attack in Cryptography 10, Sep 18 Development of Cryptography 05, Nov 18 Quantum Cryptography 09, Jan 19 One Time Password (OTP) algorithm in Cryptography 31, Jan 19 Easy Key Management in Cryptography 09, Apr 19 Bifid Cipher in Cryptography 09, Sep 19 Avalanche Effect in Cryptography 03, Feb 20 Shamir's Secret Sharing Algorithm | Cryptography 07, May 20 Knapsack Encryption Algorithm in Cryptography 03, Jun 20 Symmetric Encryption Cryptography in Java 20, Jun 20 Java implementation of Digital Signatures in Cryptography 15, Jul 20 Article Contributed By : JASHKOTHARI1 @JASHKOTHARI1 Vote for difficulty Easy Normal Medium Hard Expert Improved By : GauravK1 Article Tags : cryptography Computer Networks GATE CS Practice Tags : cryptography Computer Networks Report Issue What’s New Data Structures and Algorithms – Self Paced Course View Details Ad-Free Experience – GeeksforGeeks Premium View Details Most popular in Computer Networks Types of Network Topology UDP Server-Client implementation in C Differences between TCP and UDP Hamming Code in Computer Network Socket Programming in Python Most visited in GATE CS Normal Forms in DBMS ACID Properties in DBMS Types of Operating Systems LRU Cache Implementation Cache Memory in Computer Organization
Writing code in comment? Please use ide.geeksforgeeks.org , generate link and share the link here.
Load Comments 5th Floor, A-118,