Cryptography in Cyber Security
Crtpt- stands for hidden & graphy - stands for writing. It is the process of protecting or securing a data or information with the help of codes.
Yes, the data gets stored in the form of codes such as : "8b1a9953c4611296a827abf8c47804d7" Can you guess the actual word ? It's 'Hello' similarly "64ef07ce3e4b420c334227eecb3b3f4c" is the code or the hash for "Cryptography".
This technique is derived from some mathematical concepts .
This process of crypting texts or the plain texts into cipher text or the crypted text is called Cryptography. If I give an example of Cryptography then WhatsApp will be the best to explain. Did you ever notice that after writing the first text to a person in WhatsApp at the top the message appears as "End-to-end encrypted". Hence it ensures you that " now your message is encrypted and is totally saved securely" , but in time when needed it can also be decrypted too.
This process of Cryptography also ensures that 'a person now cannot read your message if it is not for his/her'. Now it will only be understood by the receiver and the sender of the message.
Plain text--->Encryption--->Cipher text--->Decryption---->Plain text.
This process also uses a Key which only the sender & the receiver can have. That KEY is called the Single Key or the Symmetric Key. These keys are also called the algorithm .
In this case of keys there is Public key & Asymmetric key also, with the Public key stays the Private key which is only with the sender of the message. If the sender and the receiver wants then they can share their keys to each other for decrypting their messages.
An attacker can easily bypass Cryptography and enter into a computer which uses default keys but here to know the messages or to read the messages Cryptography makes it harder.
-Thank You
Follow me on Instagram: @swapnoneel1232004
Stay Safe & Stay Secure
All The Best!
Comments
Post a Comment
If you have any doubt or want to know something more or new,you are most welcome. Just let me know.