What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (2024)

Become a Certified Professional

Encryption is essentially important because it secures data and information from unauthorized access and thus maintains the confidentiality. Here’s a blog post to help you understand ” what is cryptography “and how can it be used to protectcorporate secrets, secure classified information, and personal information to guard against things like identity theft.

Here’s what I have covered in this blog:

  • Introduction to Cryptography?
  • Encryption Algorithms
  • How various Cryptographic Algorithms Works?

You can go through this ‘What is Cryptography’ video where our Cyber Security Training expert is discussing each & every nitty-gritty of the technology.

What is Cryptography? | Introduction to Cryptography | Cryptography for Beginners | Edureka

This Edureka video about what is Cryptography and why it is essential to protect the information shared across the internet. This video on What is cryptography explains you the fundamental concepts along with various encryption techniques

Now, I’m going to take help of an example or a scenario to explain what is cryptography?

Let’s say there’s a person namedAndy.Now suppose Andy sends a message to his friend Sam who is on the other side of the world. Now obviously he wants this message to be private and nobody else should have access to the message. He uses a public forum, for example, WhatsApp for sending this message. The main goal is to secure this communication.What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (1)

Let’s say there is a smart guy called Eaves who secretly got access to your communication channel. Since this guy has access to your communication, he can do much more than just eavesdropping, for example, he can try to change the message. Now, this is just a small example. What if Eave gets access to your private information? The result could be catastrophic.

So how can Andy be sure that nobody in the middle could access the message sent to Sam? That’s where Encryption orCryptographycomes in. Let me tell you ” What is Cryptography “.

Look out for our CEH V12 Certification Training to learn more about the Ethical Hacking

What Is Cryptography?

Cryptography is the practice and study of techniques for securing communication and data in the presence of adversaries.

What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (2)

Alright, now that you know ” what is cryptography ” let’s see how cryptography can help secure the connection between Andy and Sam.

So, to protect his message, Andy first convert his readable message to unreadable form. Here, he converts the message to some random numbers. After that, he uses a key to encrypt his message, in Cryptography, we call this ciphertext.

Andy sends this ciphertext or encrypted message over the communication channel, he won’t have to worry about somebody in the middle of discovering his private messages. Suppose, Eaves here discover the message and he somehow manages to alter it before it reaches Sam.What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (3)

Now, Sam would need a key to decrypt the message to recover the original plaintext. In order to convert the ciphertext into plain text, Sam would need to use the decryption key. Using the key he would convert the ciphertext or the numerical value to the corresponding plain text.

After using the key for decryption what will come out is the original plaintext message, is an error. Now, this error is very important. It is the way Sam knows that message sent by Andy is not the same as the message that he received. Thus, we can say that encryption is important to communicate or share information over the network.

Elevate your cybersecurity knowledge and skills with CISSP Certification Training.

Now, based on the type of keys and encryption algorithms, cryptography is classified under the following categories:

Encryption Algorithms

Cryptography is broadly classified into two categories: Symmetric key Cryptography and Asymmetric key Cryptography (popularly known as public key cryptography).

What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (4)

Now Symmetric key Cryptography is further categorized as Classical Cryptography and Modern Cryptography.

Further drilling down, Classical Cryptography is divided into Transposition Cipher and Substitution Cipher. On the other hand, Modern Cryptography is divided into Stream Cipher and Block Cipher.

So, let’s understand these algorithms with examples.

How various Cryptographic Algorithms Works?

Let’s start with the Symmetric key encryption

Symmetric Key Cryptography

Anencryptionsystem in which the sender and receiver of a message share a single, commonkeythat is used to encrypt and decrypt the message. The most popularsymmetric–keysystem is the DataEncryptionStandard (DES)

What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (5)

Transposition Ciphers

In Cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.

That is, the order of the units is changed (the plaintext is reordered). Mathematically, a bijective function is used on the characters’ positions to encrypt and an inverse function to decrypt.

Example:

What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (6)

Substitution Cipher

Method of encryption by which units of plaintext are replaced with ciphertext, according to a fixed system; the “units” may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.


Example:

Consider this example shown on the slide: Using the system just discussed, the keyword “zebras” gives us the following alphabets:

What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (7)

Stream Cipher

Symmetric or secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted.What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (8)

Block Cipher

An encryption method that applies a deterministic algorithm alongwith a symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers


What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (9)

Example: Acommon block cipher, AES, encrypts 128-bit blocks with a key of predetermined length: 128, 192, or 256 bits. Block ciphers are pseudorandom permutation (PRP) families that operate on the fixed size block of bits. PRPs are functions that cannot be differentiated from completely random permutations and thus, are considered reliable until proven unreliable.

Build a robust Cyber Security portfolio and network of contacts through this Cybersecurity Internship experience.

Find out our CISSP Course in Top Cities

IndiaIndia
CISSP Training in BangaloreCISSP Training in India
CISSP Training in ChennaiCISSP Training in Pune
CISSP Training in HyderabadCISSP Training in Mumbai

Asymmetric Key Encryption (or Public Key Cryptography)

The encryption process where different keys are used for encrypting and decrypting the information. Keys are different but are mathematically related, such that retrieving the plain text by decrypting ciphertext is feasible.What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (10)

RSA is the most widely used form of public key encryption,

RSA Algorithm

  • RSA stands forRivest, Shamir, and Adelman, inventors of this technique
  • Both public and private key are interchangeable
  • Variable Key Size (512, 1024, or 2048 bits)

Here’s how keys are generated in RSA algorithmWhat is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (11)

Alright, this was it for “What is Cryptography” blog. To safeguard your information and data shared over the internet it is important to use strong encryption algorithms, to avoid any catastrophic situations.

If you wish to learn Cybersecurity and build a colorful career in cybersecurity, then check out ourCyber Security Certification which comes with instructor-led live training and real-life case studies experience. This training will help you in becoming a Cybersecurity expert.

You can also take a look at our newly launched course on CompTIA Security+ Training Coursewhich is a first-of-a-kind official partnership between Edureka & CompTIA Security+. It offers you a chance to earn a global certification that focuses on core cybersecurity skills which are indispensable for security and network administrators.

Learn Cybersecurity the right way with Edureka’s Masters in Cyber Security program and defend the world’s biggest companies from phishers, hackers and cyber attacks.

Got a question for us? Please mention it in the comments section and we will get back to you.

What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka (2024)

FAQs

What is Cryptography? | Cryptographic Algorithms | Types of Cryptography |Edureka? ›

Encryption Algorithms

What is the cryptography algorithm? ›

Cryptography was first used in about 1900 BC in Ancient Egypt with substituted hieroglyphics to secure communication. A cryptographic algorithm is the mathematical equation used to scramble the plain text and make it unreadable. They are used for data encryption, authentication and digital signatures.

What is cryptographic algorithms summary? ›

Cryptographic algorithms can be classified as follows: Encryption algorithms that are used to encrypt data and provide confidentiality. Signature algorithms that are used to digitally “sign” data to provide authentication. Hashing algorithms that are used to provide data integrity.

What are the 5 components of cryptographic algorithms? ›

Components of a cryptosystem
  • Plaintext. Unencrypted information that needs protection.
  • Ciphertext. The encrypted, or unreadable, version of the plaintext information.
  • Encryption algorithm. ...
  • Decryption algorithm. ...
  • Encryption key. ...
  • Decryption key.

What are the types of algorithm in cryptography? ›

The core function of cryptography is encryption. It applies complex mathematical algorithms to scramble plain text into cipher text. Common algorithms used in cryptography include AES, RSA, and SHA. Powerful encryption protocols can effectively prevent unauthorized access.

What is cryptography in simple words? ›

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

Is cryptography difficult? ›

It involves a lot of mathematical concepts and techniques, which can be difficult for some people to understand. However, with a strong foundation in mathematics and computer science, and a willingness to devote time and effort to learning the subject, it is certainly possible to learn cryptography.

Why is cryptographic algorithm important? ›

Cryptography ensures the integrity of data using hashing algorithms and message digests. By providing codes and digital keys to ensure that what is received is genuine and from the intended sender, the receiver is assured that the data received has not been tampered with during transmission.

What is the difference between cryptography and encryption? ›

Cryptography vs encryption: Cryptography is the science of concealing messages with a secret code. Encryption is the way to encrypt and decrypt data. The first is about studying methods to keep a message secret between two parties (like symmetric and asymmetric keys), and the second is about the process itself.

What is the simplest encryption algorithm? ›

One of the simplest encryption algorithms is the Caesar cipher. It is a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on.

What are the two most basic functions in cryptography? ›

Answer and Explanation:
  • Substitution: In this method, every letter/symbol in the document or plaintext file is mapped into some other elements.
  • Transposition: This method incorporates re-arrangement of those elements that are saved in the plaintext file.

Is AES a cryptographic algorithm? ›

The AES Encryption algorithm (also known as the Rijndael algorithm) is a symmetric block cipher algorithm with a block/chunk size of 128 bits. It converts these individual blocks using keys of 128, 192, and 256 bits. Once it encrypts these blocks, it joins them together to form the ciphertext.

What are the 4 principles of cryptography? ›

Data Confidentiality, Data Integrity, Authentication and Non-repudiation are core principles of modern-day cryptography. Confidentiality refers to certain rules and guidelines usually executed under confidentiality agreements which ensure that the information is restricted to certain people or places.

Top Articles
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6422

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.