Also Follow us our official facebook page Follow now!

Welcome Guys !

Business Ethics Official: Provides You High Quality Content For Free.

Follow US

Cryptography

Cryptography is the study of communication techniques that involve encoding or decoding messages with cryptography algorithms.

Cryptography


Communication of information and data between two parties or devices

Cryptography



For technical definition, see Cryptography (disambiguation)



It is primarily concerned with how to protect communications against fraud,though it also tries to prevent an attacker from being aware of the encoder's message, or "man in the middle" attacks from eavesdropping on a message during transmission, for malicious purposes.


Cryptography

Cryptography can be applied universally in computing systems to authenticate users, track user activity, create digital certificates, and store cryptographic keys.


 In computer networks, it enables secure exchange of data between users by providing authentication mechanisms, integrity assurance, confidentiality, and key sharing among others.


 Some cryptographic primitives are widely used for protecting the privacy of individuals and applications.


History 


Cryptography

The name 'cryptography' comes from Latin criptus, meaning lock, which is derived from the Greek word for "cipher".For centuries, many classical cryptographic systems were based on the use of ciphers, but later some began using random number generation as part of their security function instead.


 Another major contribution came in 1944, when Leonard Kleinrock (1904–1955) proved that it is not possible to generate a universal secret key for any purpose of message encryption, regardless of complexity level, given the mathematical properties of ciphers such as number theory and algebra.


This has since become known as the Kleinrock Problem.


In 1969 John Adleman (1928–1991) created what he called the Turing Machine as a tool for demonstrating fundamental concepts of computation.


 He described his work in 1973 in this book "Computational Theory".


Cryptography

 In 1973 he demonstrated how the output is computed, and that its computational efficiency can rival a human brain, but he could not do so because of limitations in available computers at the time. 

 Because there are no direct functions of the recipient's public key, the receiver must produce a private key. Many others came after it, including the RC4 algorithm,


Cryptography

PKCS2:

RC4 – RSA Advanced Encryption Standard (RFC 852)


RC5 – RFC 852 Advanced Cipher Standard (ARC)


PKCS2 – A Diffie-Hellman Message Exchange Algorithm (RFC 5377)


RSA – US National Institute of Standards and Technology (NIST) / IMSI standard


PKCS2 – New Directions for Key Management (NDoK) standard


In 1993 Richard Branson released WPA3 (Version 2), with improvements to AES and RSAC.


 There were several versions of the same software until 2014.By then, most browsers have taken advantage of HTTPS, allowing secure communication between web servers and web browsers.

 However, there were still flaws with insecure protocols such as HTTP 1.1, despite HTTP 1.1 being finally dropped in 2012. HTTP 1.0, which was replaced by TLS 1.3, had flaws too; TLS was eventually dropped in 2017.


Asymmetric cryptography refers to using one party's key (private key) and one party's public key.


Cryptography

 Thus, if you want to read a file encrypted with your own public key, you'd need to know all other secrets such as yours. Asymmetric cryptography, therefore, only requires two parties to be involved, and is more efficient and less vulnerable to cracking attempts. 


 Its weaknesses make it difficult to implement for all systems; while they can solve a variety of tasks in a system, it can't guarantee that the key will remain un-modified; thus, it cannot perform as well as or outperform other solutions such as DES, Triple DES, FIDE, etc.,

Read Also :

Post a Comment