Glossary

Cryptography

Cryptography is a technique of securing information and communication using codes so that only the person for whom the information is intended can understand and process it. This prevents unauthorized access to information. The prefix “crypt” means “hidden” and the suffix graph means “writing”. In cryptography, the techniques used to protect information are derived from mathematical concepts and a set of rule-based calculations known as algorithms to convert messages in ways that make them difficult to decode. These algorithms are used for generating cryptographic keys, digital signing, and authentication to protect data privacy, and web browsing on the Internet, and to protect confidential transactions such as credit and debit card transactions.

Techniques used for cryptography:

In today’s computer age, cryptography is often associated with the process of converting plain text into ciphertext, which is text made so that the intended recipient of the text can only decode it, hence the process is known as encryption. The process of converting ciphertext into plaintext is called decryption.

The functions of cryptography are as follows:

  • Confidentiality: Information is accessible only to the person for whom it is intended and no other person can access it except him.
  • Integrity: Information cannot be altered in storage or transit between the sender and intended recipient without any additional information being detected.
  • Non-repudiation: The creator/sender of the information cannot deny his intention to send the information at a later stage.
  • Authentication: The identity of the sender and receiver is confirmed. Likewise, the destination/origin of the information is confirmed.

Types of Cryptography:

  • Symmetric Key Cryptography: It is an encryption system where the sender and receiver of a message use one common key to encrypt and decrypt messages. Symmetric key systems are faster and easier, but the problem is that the sender and recipient must somehow exchange the key securely. The most popular symmetric key cryptographic system is the Data Encryption System (DES).
  • Hash function: No key is used in this algorithm. A fixed-length hash value is calculated based on the plaintext, making it impossible to recover the plaintext content. Many operating systems use hash functions to encrypt passwords.
  • Asymmetric Key Cryptography: In this system, a pair of keys are used to encrypt and decrypt information. The public key is used for encryption and the private key is for decryption. The public key and private key are different. Even though everyone knows the public key, the intended recipient can only decode it because they are the only ones who know the private key.
With over 6 years of experience in the digital marketing landscape, She has honed her expertise in executing high-impact SEO strategies, content optimization, link building, and leveraging data analysis to enhance online visibility and drive substantial revenue growth. As an EX- SEO Analyst at Coinpedia.org with a Bachelors degree in Computer Science and Engineering she excels in tailoring SEO strategies to meet the unique needs of any project, consistently turning challenges into opportunities to maximize outcomes.
The presented content may include the personal opinion of the author and is subject to market condition. Do your market research before investing in cryptocurrencies. The author or the publication does not hold any responsibility for your personal financial loss.