CRYPTOGRAPHY


CRYPTOGRAPHY

Cryptography has been derived from two Greek words (Kryptos & Graphite) which means secret writing.

Cryptographic tools are important for civil society and industry ...

I will try to explain this in layman’s language;

  • In case you wish to communicate secretly with someone and you have designed and shared your coded language for that. The code is a secret between both of you, This is a small example of cryptography.
  • It converts your simple Hello to some scrambled text may be some numbers characters, special characters; depends on the logic or the mathematics which you have used. It could be as simple as Julius ceaser, algorithm which just replace or swap with the key. 
What is PGP Encryption and How Does It Work? | Varonis

Encryption

Suppose the key is 2 and the plain text or message which you wish to share is HELLO. So H will move two (2 is the Key in this case) places further.

i.e. H will be replaced by K; E will be replaced by H, L will be replaced by O and so on. 

This process is known as Encryption as you are converting plain text to unreadable format.

Decryption

When the receiver receives the cipher or scrambled message, i.e. “KHOOR”. He will decipher it by using the same key but will go in reverse direction (-2). 

i.e K will be replaced by H (two places before K), H will be replaced E and so on. 

This process is known as Decryption.

                              Encryption - What It Is, Types, Algorithms, & More | Proofpoint 


All cryptography algorithm can be divided into two parts:

    1. Symmetric cryptography
    2. Asymmetric cryptography

What is the difference between symmetric and asymmetric cryptography?

  • With symmetric cryptography, the same key is used for both encryption and decryption. A sender and a recipient must already have a shared key that is known to both. Key distribution is a tricky problem and was the impetus for developing asymmetric cryptography.
  • With asymmetric crypto, two different keys are used for encryption and decryption. Every user in an asymmetric cryptosystem has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.

There are 3 basic cryptographic algorithms :

    1.  Secret Key
    2.  Public Key
    3.  Message Digest ( hash tables )

FOR EXAMPLE :



Top Cryptography Tools

    1. Security Token/Authentication Token
    2. CertMgr.exe
    3. JCA 
    4. Docker
    5. SignTool.exe
 

NOTE: OUR EACH AND EVERY PICTURE OF THIS BLOG IS DIRECTLY TAKEN BY GOOGLE.COM AND SOME CONTENT IS ALSO COPIED FROM GOOGLE FOR BETTER ANALYTICS AND PROPER REPORT. 

THANK YOU VERY MUCH 

PLEASE SHOW YOUR LOVE BY LIKE , COMMENTS AND SUBSCRIBE US 
FOR MORE TECH RELATED CONTENT

our telegram link
 https://t.me/w36c0d3r


Our youtube teaser video
https://youtu.be/D5XwOuB4ZMg


http://www.scriptkiddies.cf/
our website link


https://www.scriptkiddieshackers.com/2020/06/hacking-hacking-refers-to.html
our blog link


https://instagram.com/script_kiddies_developers?igshid=17prws6olul0r
Our Instagram page link 
https://instagram.com/team_script_kiddies?igshid=ei7vr4q1vpls


FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN 






Post a Comment

0 Comments