top of page

CRYPTOGRAPHY

What is it?

The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text.

 

 

Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.

 

 

  • As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. 

 

Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-keysystems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses.

  • The processes of Cryptography are: encryption, hashing and steganography. 

What is encryption?

Encryption is the process of securing data in a way that can be transmitted in the open without being readable until it is decrypted by the intended recepient with a key.

 

There are two main types of encryption: Symmetric Key Encryption and Public Key Encryption. The difference between the two is very important.

 

  • With symmetric key encryption, only someone who knows the key can decrypt messages encrypted with that same key. This means that if you wanted to send an encrypted message to someone, they would have to know the key you used to encrypt it beforehand, or they would be unable to decrypt and receive the message. The safety of this key used is very important, as if the key is compromised then all messages encrypted with it would be revealed.

  • With public key encryption, there are actually two different keys. A public key and a private key. You can freely give out your public key to anyone, but your private key you must keep to yourself. A pair of people can exchange public keys, and communicate with each other securely, even if an eavesdropper intercepted both public keys. This is because the public keys and private keys are mathematically linked – it allows them to communicate their public keys in the open initially, and then securely after the initial exchange by encrypting using each individuals private key. This concept may sound confusing – but it’s really quite simple when you understand why it works.

What is cryptanalysis?

Cryptanalysis is the study and act of analyzing cryptographic systems in order to understand how they work and how they can be broken. This can include analyzing the cryptographic algorithm itself, as well as potential side-channel attacks – weaknesses in their implementation rather than the algorithm itself.

 

 

Cryptanalysis is an important part of understanding cryptography in a practical way.

 

  • In the past, cryptanalysis involved trying to solve for the key in order to decrypt a message, eventually developing such methods as frequency analysis and the dictionary attack as a way to crack an encryption scheme faster than a brute force search. One of the earliest high points of cryptanalysis was during World War II, when cryptologists at Bletchley Park worked to crack the German’s Enigma Cipher, eventually succeeding and winning the war.

  • In recent times however, the focus of cryptanalysis has shifted from solving ciphers and discovering the method used in the encryption to rather solving problems in pure mathematics, to discover the most computationally efficient way of analysing a cipher text.

 

As computers are now almost entirely relied upon for secure communications, it is important that the mathematics that allow them to be possible are secure and will remain so even as computers get faster and faster – while still being efficient systems in themselves.

CONTACTS

Montague Road, Smethwick Birmingham, United Kingdom B66

Tel: 074403039000
Mail: softcrypterenquires@gmail.com

© 2016 Softcrypter.com - SECURITY SOFTWARE INFORMATION

bottom of page