Cryptography is a method of securing information between the sender and recipient using code that are generated by the sender a d the recipients.
When sending and receiving data or information the most common use of cryptography is to encrypt and decrypt it.
The main concern if cryptography is to follow these objectives.
Confidentiality : this means the information should not be understood by those to whom it is not intended for.
Integrity: this ensures that the information cannot be altered in storage transit between the sender and recipient without being detected.
Non-repudiation : this ensures that the creator of the information cannot deny their intentions in the creation of the information.
Authentication. The sender and recipient can both confirm the identity and the origin or destination of the information.
The first is the symmetric encryption. I this types of cryptography the the encoded message and the secret key are sent to the recipient. They problem with this type encryption system was that if a hacker interceptes the message it will be easy to decrypt it since they already have the key.
To solve this problem a second method of cryptography was designed which is the asymmetric or "public key" this type of encryption, every user has a private key and a public key. when the sender wants to send a message he requests for the public key of the receiver and then send it to the receiver who as the only key to decrypt the message. This meant that even if a hacker intercepted the message there will no way to access the information without the corresponding private key.
RSA(Rivest–Shamir–Adleman) public key used largly o the internet.
Elliptic Curve Digital Signature Algorithm (ECDSA) used by Bitcoin
Digital Signature Algorithm (DSA) adopted as a Federal Information Processing Standard for digital signatures by NIST in FIPS 186-4
Diffie-Hellman key exchange
Hackers can skip cryptography, through breaking into the computer systems which are responsible for information encryption and decryption, and make the most susceptible implementations of it through the use of default keys. But cryptography make sure that messages are stable a d included through the algorithms.
Growing worries is the processing energy of quantum computing to interrupt modern-day cryptography encryption requirements but as it stands there aren't any quantum computer systems for now. But in the next few decades that may change.
To conclude, it is recommended that you encrypt all information that is to be sent using the public key encryption. It is also good to protect sensitive data by encrypting.You can always look for the best security solutions that has some the best cryptography algorithms with easy to use interfaces for better understanding.
References
https://online.maryville.edu/blog/cryptography-vs-encryption.
https://www.kaspersky.com/resource-center/definitions/what-is-cryptography
Hello @kombatnatuka , your post have been reviewed by @reminiscence01 using @steemcurator07 account.
Thank you for making a post in the #Science/ #Computing/ #Technology category. We appreciate the work you have put in this post.
We have analyzed your post and come up with the following conclusion:
Follow @steemitblog for all the latest update and Keep creating qualityful contents on Steemit!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Hello @reminiscence01, Please I don’t understand why my post has been reviewed.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
This is because you have been found guilty of plagiarism in your previous content.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit