![Cryptography Introduction Cryptography Introduction](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFseS-oi9_SH2ylB6PO25Yo1tTBx-ifcAk2yaCKDrvQI1g3u6HWrx9nlcseBIKQ1rF2J3XMV7K3hxKwiEt1Xj1gFPAfQfZJCp88iIPjpzWfAWrLKZJ3T4qXkD2phjnaztA0_e-OO-8DQ4/w320-h180/quantumexplainer3.2-01-10.jpg)
Cryptography
Introduction
Cryptography is
the study and practice of techniques for secure communication in the presence of
third parties called adversaries. It deals with developing and analyzing
protocols which prevents malicious third parties from retrieving information
being shared between two entities thereby following the various aspects of
information security.
Secure
Communication refers to the scenario where the message or data shared between
two parties can’t be accessed by an adversary. In Cryptography, an Adversary is
a malicious entity, which aims to retrieve precious information or data thereby
undermining the principles of information security.
Data
Confidentiality, Data Integrity, Authentication and Non-repudiation are core
principles of modern-day cryptography.
1.
Confidentiality refers to certain rules and
guidelines usually executed under confidentiality agreements which ensure that
the information is restricted to certain people or places.
2.
Data integrity refers to maintaining and making sure that the data
stays accurate and consistent over its entire life cycle.
3.
Authentication is the process of making sure that the piece of
data being claimed by the user belongs to it.
4.
Non-repudiation refers to ability to make sure that a
person or a party associated with a contract or a communication cannot deny the
authenticity of their signature over their document or the sending of a
message.
Alice
(Sender) Bob (Receiver)
C = E (m,
k) ----> m = D (C, k)
Here,
C refers to the Ciphertext while E and D are the Encryption and Decryption
algorithms respectively.
Plaintext :
Geeksforgeeks
Ciphertext :
Jhhnvirujhhnv
Note that even if the adversary knows that
the cipher is based on Caesar Cipher, it cannot predict the plaintext as it
doesn’t have the key in this case which is to shift the characters back by
three places.
Refer for Introductionto Crypto-terminologies
0 Comments