Introduction To Cryptography Basic Principles
Introduction To Cryptography Basic Principles
Introduction To Cryptography Basic Principles
When we come the period cryptography, the main object and possibly the only thing that comes
to our mind is private communication during encryption. There is more to cryptography that just
encryption. In this article, we will effort to study the fundamentals of cryptography.
4. Non Repudiation
If Alice sends a message to bob but denies that the she has actually sent the message? it`s like
these may happen and cryptography should prevent the originator or sender to act this way. one
popular way to achieve this is through the use of digital signatures.
Types of Cryptography
Cryptography is three types of cryptography techniques:
Hash Functions
This technique is the biggest problem. it is the distribution of key as this algorithm makes use of
single key for encryption or decryption.
.2. Public Key Cryptography
Cryptography technique involves two key crypto system in which a secure communication it can
be take between sender and receiver over insecure communication channel. the pair of key is
applies here so this technique is also known as asymmetric encryption.
In this technique, each party has a public key and private key and private key private is secret
and Is not exposed while the public key is shared all those whom you want to communicate with.
if alice wants to a message send to bob, then alice will encrypt it with Bob`s public key and bob
can decrypt the message with its private key.
This is what we use as we group public key verification in open ssh to login from one server to
anther server in the backend without have to enter the key.
3. Hash Functions
Any key involve does not any technique. It uses a fixed size & hash value that is compute on the
basis of the plain text message. The hash functions are used to check the integrity of the message
to guarantee that the message has not be changed, compromise or artificial by virus.
So we see that how different types of cryptography techniques (described above) are used to
implement the basic principles that we discussed earlier. In the future article of this series, well
cover more advanced topics on Cryptography.