Hello friends,
I'm here to present my home work by Cryptography for his discussed by professor @stream4u
source:Google
What is Cryptography?
Cryptography is defined as the system by which data and information of value are stored or transmitted in such a way that only those for whom it is intended can read, interpret or process it. Effectively, cryptography obscures information from unauthorized snoopers and interceptors. In the same way, it can be used to hide dubious and clandestine activities in our modern cyber world today. Let's examine the important aspects and uses of cryptography.
Uses of Cryptography: Secrecy
Data Transmission
Data is at risk when it is in motion (during transmission). The risk occurs when unauthorized persons attempt to intercept, copy, modify, corrupt or delete the data. There has to be secrecy in data transmission, which is one of the uses of cryptography.
Transmission always involves two parties: a sender and a receiver. For the secrecy to be effective during transmission, the data has to be encrypted (encoded) from the moment it leaves the sender until it successfully reaches the receiver. Encryption is defined as the process of converting data from the normal, readable format into an encoded format which is unreadable by others.
The encrypted data can only be accessed and read by the parties in possession of the decryption (decode) key. Figure 1 shows cryptography in data transmission with the sender possessing the encryption (Key A) and the recipient possessing the decryption (Key B).
Data Storage
Data in storage refers to data at rest (on a storage device). Our storage devices are very sensitive. In our current society, computers have practically been replaced by smart devices. This means that these devices contain tons of sensitive data from our daily activities. Secrecy in storage is achieved by storing of information in an encrypted form. This way, unauthorized intruders to the system will be presented with gibberish as data, thereby preventing any data compromises.
In the absence of the correct key, the data is inaccessible. The user possesses the key to access the data. Data is arranged in files and folders on computers and devices and individual levels of secrecy can be applied. Keys should be changed on a regular basis and offsite to maintain security. Data in use while on the system, however, is not encrypted. This is a point of vulnerability of data on the system.
cryptography
Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
Cryptography techniques
Cryptography is closely related to the disciplines of cryptology and cryptanalysis.
Confidentiality: the information cannot be understood by anyone for whom it was unintended
Integrity: the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected
Non-repudiation: the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information
Authentication: the sender and receiver can confirm each other's identity and the origin/destination of the information
Procedures and protocols that meet some or all of the above criteria are known as cryptosystems.