Cryptography and it importance

in Zero to Infinity3 years ago (edited)

matching-keys-made-circuits-led-lights-encryption-crypto-algorithms-cryptography-concepts-public-private-electronic-79973735.jpg

Source

In my recent post about Cybersecurity I talked about and how they operates. In this post I would like to talk about a way that is used to secure the transmission of data from one device to another. It is these set of algorithms that protects our our privacy on the Internet by hiding the contents of our messages. Cryptography is what I would like to discuss today to educate people on what it is and how it protects our privacy on the internet.

cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81LetETmuDWKvqCPmaSADqzr7cvw5uMJgEuBeuvuxazYG8zoQXWgA6qkN5Yo32DcRzka1VLsrb2BJSkBrF9yjpHU.png

Cryptography is a method of securing information between the sender and recipient using code that are generated by the sender a d the recipients.

When sending and receiving data or information the most common use of cryptography is to encrypt and decrypt it.

The main concern if cryptography is to follow these objectives.

  1. Confidentiality : this means the information should not be understood by those to whom it is not intended for.

  2. Integrity: this ensures that the information cannot be altered in storage transit between the sender and recipient without being detected.

  3. Non-repudiation : this ensures that the creator of the information cannot deny their intentions in the creation of the information.

  4. Authentication. The sender and recipient can both confirm the identity and the origin or destination of the information.

cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81LetETmuDWKvqCPmaSADqzr7cvw5uMJgEuBeuvuxazYG8zoQXWgA6qkN5Yo32DcRzka1VLsrb2BJSkBrF9yjpHU.png

Types of cryptography encryption

The first is the symmetric encryption. I this types of cryptography the the encoded message and the secret key are sent to the recipient. They problem with this type encryption system was that if a hacker interceptes the message it will be easy to decrypt it since they already have the key.

To solve this problem a second method of cryptography was designed which is the asymmetric or "public key" this type of encryption, every user has a private key and a public key. when the sender wants to send a message he requests for the public key of the receiver and then send it to the receiver who as the only key to decrypt the message. This meant that even if a hacker intercepted the message there will no way to access the information without the corresponding private key.

cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81LetETmuDWKvqCPmaSADqzr7cvw5uMJgEuBeuvuxazYG8zoQXWgA6qkN5Yo32DcRzka1VLsrb2BJSkBrF9yjpHU.png

Some examples public key Cryptography

  1. RSA(Rivest–Shamir–Adleman) public key used largly o the internet.

  2. Elliptic Curve Digital Signature Algorithm (ECDSA) used by Bitcoin

  3. Digital Signature Algorithm (DSA) adopted as a Federal Information Processing Standard for digital signatures by NIST in FIPS 186-4

  4. Diffie-Hellman key exchange

cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81LetETmuDWKvqCPmaSADqzr7cvw5uMJgEuBeuvuxazYG8zoQXWgA6qkN5Yo32DcRzka1VLsrb2BJSkBrF9yjpHU.png

Concerns of Cryptography

Hackers can skip cryptography, through breaking into the computer systems which are responsible for information encryption and decryption, and make the most susceptible implementations of it through the use of default keys. But cryptography make sure that messages are stable a d included through the algorithms.


Growing worries is the processing energy of quantum computing to interrupt modern-day cryptography encryption requirements but as it stands there aren't any quantum computer systems for now. But in the next few decades that may change.

cyxkEVqiiLy2ofdgrJNxeZC3WCHPBwR7MjUDzY4kBNr81LetETmuDWKvqCPmaSADqzr7cvw5uMJgEuBeuvuxazYG8zoQXWgA6qkN5Yo32DcRzka1VLsrb2BJSkBrF9yjpHU.png

To conclude, it is recommended that you encrypt all information that is to be sent using the public key encryption. It is also good to protect sensitive data by encrypting.You can always look for the best security solutions that has some the best cryptography algorithms with easy to use interfaces for better understanding.






References
https://online.maryville.edu/blog/cryptography-vs-encryption.

https://www-techtarget-com.cdn.ampproject.org/v/s/www.techtarget.com/searchsecurity/definition/cryptography?

https://www.kaspersky.com/resource-center/definitions/what-is-cryptography

Sort:  

Hello @kombatnatuka , your post have been reviewed by @reminiscence01 using @steemcurator07 account.

Thank you for making a post in the #Science/ #Computing/ #Technology category. We appreciate the work you have put in this post.

We have analyzed your post and come up with the following conclusion:

CriteriaRemarks
PlagiarismNone
Quality of InformationGood
Clarity of LanguageGood
#club5050Yes
#steemexclusiveYes
Final ConclusionBlacklisted

Follow @steemitblog for all the latest update and Keep creating qualityful contents on Steemit!

Hello @reminiscence01, Please I don’t understand why my post has been reviewed.

This is because you have been found guilty of plagiarism in your previous content.