You are on page 1of 7

SIKBNNDJS(CRYPTOLOGY)

BY SHIKHAR BERIWAL
CRYPTOGRAPHY

Cryptography is a method of protecting information and communications


through the use of codes, so that only those for whom the information is
intended can read and process it. The prefix "crypt-" means "hidden" or "vault"
-- and the suffix "-graphy" stands for "writing.“
There are two types of cryptography symmetry and asymmetry.
SYMMETRIC ENCRYPTION

Symmetric encryption is a type of encryption where only one key (a secret


key) is used to both encrypt and decrypt electronic information. The entities
communicating via symmetric encryption must exchange the key so that it can
be used in the decryption process. Example is Caesar Cipher encryption.
PUBLIC KEY OR ASYMMETRIC ECRYPTION

Asymmetric Encryption, also known as Public-Key Cryptography, is an


example of one type. Unlike “normal” (symmetric) encryption, Asymmetric
Encryption encrypts and decrypts the data using two separate yet
mathematically connected cryptographic keys. These keys are known as a
'Public Key' and a 'Private Key.
HASHING

Hashing is the transformation of a string of characters into a usually shorter


fixed-length value or key that represents the original string. Hashing is used to
index and retrieve items in a database because it is faster to find the item using
the shorter hashed key than to find it using the original value.
CRYPTOGRAPHY APPLICATION

The most obvious use of cryptography, and the one that all of us use frequently,
is encrypting communications between us and another system. This is most
commonly used for communicating between a client program and a server.
Examples are a web browser and web server, or email client and email server.
CONGRATULATIONS! YOU HAVE COMPLETED
WEEK 2

You might also like