Thumbnail gotten from pixabay
Introduction
Cryptography has been in practic for ages before computer inventors. Historically, secrets were tattooed on the shaved heads of slaves, then concealed once the hair grew back, or messages were encoded using shifting alphabets, a method known as the Caesar Cipher. Today, powerful computers uses advanced cryptographic encryption to keep data secure. However, with the constant improve nature of technology, what is considered secure today may become old tomorrow.
Cryptography refers to a method for protecting informations and communication through the use of codes so that only those for whom the info is intended can read and process it or the process of hiding or coding informations so that only those whose the information is made for can read it or a computational and mathematical practice of decoding and encoding data or a procedure or process of obfuscating and securing data/informations in such a way that it is only accessing for the individual whom the message Isa made for.
Types of Cryptography
There are many types of Cryptography but I will like to discuss five among them starting from Symmetrical, Asymmetrical and Harsh function cryptography.
SYMMETRICAL CRYPTOGRAPHY: In this encryption system, the sender and recipient uses a single common key to encrypt and decrypt . This system is faster and simpler but has a small issue which is the sender and receiver have to exchange key somehow in a secure manner. The popular known symmetrical cryptography is Advanced Encryption System (AES) and Data Encryption System(DES)
ASYMMETRICAL CRYPTOGRAPHY:It is also known as asymmetrical encryption. It allows users to encrypt information or data using a shared key. It comes from two keys which are:-
Public encryption key(here anyone can see and access it).
Private encryption key (here only the authenticated recipient have access to it)
DIFFERENCE BETWEEN SYMMETRICAL CRYPTOGRAPHY AND ASYMMETRICAL CRYPTOGRAPHY
Symmetrical cryptography uses a one key for encoding and decoding data while Asymmetric cryptography uses a a pair of keys which are public key used for encoding data and a private key used to decode data.
HASH FUNCTION CRYPTOGRAPHY:There's no use of any key in this cryptographic algorithm. A harsh value with fixed length is calculated as per the plain text which makes it possible the contents of plain text to be recovered. Most operating systems uses a harsh function to encrypt password.
Here is why hash funtiiis necessary;
A hash function is used to change input data of any size into a fixed outputsize . The output, known as the hash, is special and different to each unique input.
DIGITAL SIGNATURES: Ensuring Authenticity and Integrity. Digital signatures are another critical concept in cryptography. While encryption is about protecting data from being exposed or unreadable, signing serves a various purpose: it provides a means to indicate that a message came from a reliable source.
SALT: It is a random data or a random string added to a hash in order not to be simple to create a password in a strong way that can not be tampered with.
It is usually 32 strings or more.
SEVEN CRYPTOGRAPHIC CONCEPTS ANY DEVELOPER SHOULD BE AWARE OF
Encryption or encoding, decryption or decoding, hashes, salt, symmetric cryptography, asymmetric cryptography, and digital signatures are the seven critical cryptographic concepts .
APPLICATION OF CRYPTOGRAPHY
It is used in creating and maintaining computer Passwords.
It it applied in digital currencies such as Bitcoin to safety transactions and prevent fraud.
It is used to secure web browsing by shielding users from eavesdropping and man-in-the middle assaults.
GOALS/FUNCTIONS/ROLES OF CRYPTOGRAPHY IN DIGITAL WORLD
Privacy: - here, it ensures that only the recipient has access to the encrypted data.
Authentication:-here, one has to show or prove his identity
Integrity:-it assures the recipient that the message is still intact an has not been tampered with.
Non-repudation:- It is a way or process to show or verify that the sender really sent the message.
Key exchange:- It is a process of sharing crypto keys between the sender and recipient.
In conclusion, cryptography is useful in our daily activities involved in digital world and blockchain for it provides maximum security to the encrypted data for the recipient and equally a reliable source of data encryption. It equally ensures adequate confidentiality to data/information to digital activities.