Professional Documents
Culture Documents
use of codes so that only those persons for whom the information is intended can
understand it and process it. Thus preventing unauthorized access to information.
In Cryptography the techniques which are used to protect information are obtained
from mathematical concepts and a set of rule based calculations known as
algorithms to convert messages in ways that make it hard to decode it. These
algorithms are used for cryptographic key generation, digital signing, verification to
protect data privacy, web browsing on the internet and to protect confidential
transactions such as credit card and debit card transactions.
i. Privacy – The transmitted data should not be known by external parties except for
the intended individual.
ii. Reliability – the data cannot be modified in storage or transfer between the
sender and the destined receiver having no kind of modification.
iii. Non-repudiation – Once the data is transmitted, the sender has no chance to
deny it in the later phases.
iv. Authentication – Both the sender and receiver need to circumstantiate their own
identities about the transmitted and received data.
Cryptography Types
In cryptography, encryption of the information is classified as two types those are
discussed below:
-> It only requires a single key for both encryption and decryption.
-> The size of cipher text is the same or smaller than the original plain text.
-> The encryption process is very fast.
-> It is used when a large amount of data is required to transfer.
-> It only provides confidentiality.
-> Examples: 3DES, AES, DES and RC4
-> In symmetric key encryption, resource utilization is low as compared to
asymmetric key encryption.
ii. Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt information. A public
key is used for encryption and a private key is used for decryption. Public key and
Private Key are different. Even if the public key is known by everyone, the intended
receiver can only decode it because he alone knows the private key.
-> It requires two keys, one to encrypt and the other one to decrypt.
-> The size of cipher text is the same or larger than the original plain text.
-> The encryption process is slow.
-> It is used to transfer small amounts of data.
-> It provides confidentiality, authenticity and non-repudiation.
-> Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA
-> In asymmetric key encryption, resource utilization is high.