Cyber Security | Cryptography Algorithms Types

1.Confidentiality:

Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Symmetric algorithms allow encryption and decryption with the same key.

Features Cryptography:-

Confidentiality:-

Information can only be accessed by the person for whom it is intended and no other person except him can access it.

2.Integrity:-

Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct.

Digital Signatures Verification:-

Digital signature technology allows the recipient of given signed message to verify its real origin and its integrity.
The process of digital signature verification is purposed to ascertain if a given message has been signed by the private key that corresponds to a given public key

3.Non-repudiation:-

Non-repudiation is the assurance that someone cannot deny the validity of something.

Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data.

4.Authentication:-

Authentication is the process of recognizing a user’s identity.

It is the mechanism of associating an incoming request with a set of identifying credentials.

Identification phase provides a user identity to the security system.

This identity is provided in the form of a user ID.

Types of Cryptography

Symmetric Key Cryptography:

It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages.

Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner.

The most popular symmetric key cryptography system is Data Encryption System(DES).

2.Hash Functions:

There is no usage of any key in this algorithm.

A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered.

Many operating systems use hash functions to encrypt passwords.

3.Asymmetric Key Cryptography:

Under this system a pair of keys is used to encrypt and decrypt information.

A public key is used for encryption and a private key is used for decryption.

Public key and Private Key are different.

Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.

--

--

--

InfoSec Writer/Instructor/Custom Course Creator Bug Bounty Hunter Penetration Tester

Love podcasts or audiobooks? Learn on the go with our new app.

How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

{UPDATE} Слова из слова 2018 Hack Free Resources Generator

{UPDATE} 指尖消雄 Hack Free Resources Generator

How to Install Cuckoo Sandbox

{UPDATE} Smash Circle Hack Free Resources Generator

{UPDATE} Snooker World Hack Free Resources Generator

Privacy and Data Protection

What security features should you use in your enterprise LMS?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Akash Ranjan Patel

Akash Ranjan Patel

InfoSec Writer/Instructor/Custom Course Creator Bug Bounty Hunter Penetration Tester

More from Medium

Everything you need to know about crypto trading fee

Weird Food Combinations that Surprisingly Go Well Together

SolCast bot Introduction