what is Cryptography and network security. Type of key in cryptography. cryptography keys example. use of cryptography key
- Get link
- Other Apps
CRYPTOGRAPHY
The words cryptography comes from two words one is crypto and the other is graphy. here crypto means secret and the the meaning of graphy is writing so the cryptography min secret writing.
Cryptography is a writing medium where plain text is converted to cipher text and cipher text is also converted in to plain text.
What is the plain text ?
plain text is a normal text or normal message that any one can read and understand what is written in the massage or what is meant by the message.
What is the cipher text ?
cipher text is a modified from of plain text. any one can read that but no one can understands what's the massage means. it is also called a secret massage.
Why we transfer plain text to cipher text ?
We need to change this because we want privacy. When we want to say or explain something secret to another particular person and we want no one can be able to read or understand the message except that particular person. There are many times happened when a third person reads our message from the middle or finds out about our secret conversation, thus violating our privacy. So Plain text is encrypted with encryption algorithm and converted to cipher text for that even if a third person reads the message, he does not understand what the message means.
What is the key of cryptography ?
The medium by which a simple text is encrypted and converted to cipher text or the medium that decrypted cipher text and converts it into plain text is called key.
There are four types of key
1. Encryption key
2. Decryption key
3. Symmetric key
4. Asymmetric key
1. what is the encryption key ?
Encryption key is used to encrypt plain text with encryption algorithms and convert it to cipher text.
2. What is the decryption key
In which process Cipher text is decrypted by a decryption algorithm and converted back to plain text. This is called decryption key.
3. what is symmetric key ?
when the medium of converting from plain text to cipher text and the medium of converting from cipher text to plain text are equal than the medium is called symmetric key.
4.What is asymmetric key ?
when the medium of converting from plain text to cipher text and the medium of converting from cipher text to plain text are different than the medium is called asymmetric key.
Use of cryptography
⦁ Use on network security :-
In our day to day life when we send secret massages like password or other confidential information to other specific people through social media, in this time some unscrupulous hacker can break our privacy by looking at the messages sent by us so cryptography is used here.
The massages we send here are encrypted in the encryption algorithm and converted to cipher text. As a result, even if a third person reads the massage, he dose not understand what the massage means. Due to which our privacy is maintained and cipher text is decrypted and change in to normal plain text when the massage reaches the receiver.
⦁ Use off cryptocurrency exchanges :-
Since cryptocurrency is a decentralized currency and there does not involve any bank so it's transaction carries high risk. so during cryptocurrency exchange, the cryptocurrency we send through blockchain security and with the help of cryptography is converted into a cipher text and then sent. As a result, its becomes much more secure
Comments
Post a Comment