Cryptography and its Types
Last Updated :
08 May, 2025
Cryptography is a technique of securing information and communications using codes to ensure confidentiality, integrity and authentication. Thus, preventing unauthorized access to information. The prefix "crypt" means "hidden" and the suffix "graphy" means "writing". In Cryptography, the techniques that are used to protect information are obtained from mathematical concepts and a set of rule-based calculations known as algorithms to convert messages in ways that make it hard to decode them. These algorithms are used for cryptographic key generation, digital signing, and verification to protect data privacy, web browsing on the internet and to protect confidential transactions such as credit card and debit card transactions.

Features Of Cryptography
The features of cryptography that makes it a popular choice in various applications could be listed down as:
- Confidentiality: Information can only be accessed by the person for whom it is intended and no other person except him can access it.
- Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected.
- Non-repudiation: The creator/sender of information cannot deny his intention to send information at a later stage.
- Authentication: The identities of the sender and receiver are confirmed. As well destination/origin of the information is confirmed.
- Interoperability: Cryptography allows for secure communication between different systems and platforms.
- Adaptability: Cryptography continuously evolves to stay ahead of security threats and technological advancements.
How Does a Cryptographic Key Work?
As we all know that cryptography technique is use to convert plain text into ciphertext. This technique is done by cryptographic key. Basically cryptographic key is a string of characters which is used to encrypts the data and decrypt the data.
"Geeks for Geeks" + ⚿ = "HYMeAS90#"
For example- "Geeks for Geeks" is a plaintext and convert into ciphertext "HYMeAS90#" with the help of cryptographic key.
Types Of Cryptography
There are three types of cryptography, namely Symmetric Key Cryptography, Asymmetric Key Cryptography and Hash functions, here's a detailed explanation below:
1. Symmetric Key Cryptography
Symmetric Key Cryptography is an encryption system where the sender and receiver of a message use a single common key to encrypt and decrypt messages. Symmetric Key cryptography is faster and simpler but the problem is that the sender and receiver have to somehow exchange keys securely. The most popular symmetric key cryptography systems are Data Encryption Systems (DES) and Advanced Encryption Systems (AES) .
Symmetric Key Cryptography 2. Hash Functions
There is no key required in hash function cryptography as it uses mathematical equations to genrate a hash message for nay arbitrary length of message, and the output will be of fixed length. Some of the famous hash function are:
3. Asymmetric Key Cryptography
In Asymmetric Key Cryptography , a pair of keys is used to encrypt and decrypt information. A sender's public key is used for encryption and a receiver's private key is used for decryption. Public keys and Private keys are different. Even if the public key is known by everyone the intended receiver can only decode it because he holds his private key. The most popular asymmetric key cryptography algorithm is the RSA algorithm.
Asymmetric Key Cryptography Applications of Cryptography
Cryptography has wide area of applications in the modern world, where the technology is rapidly evolving. From authentication measures to cryptocurrencies, cryptography is here to stay, these are some of the most common applications of cryptography listed below:
- Computer passwords: Cryptography is widely utilized in computer security, particularly when creating and maintaining passwords. When a user logs in, their password is hashed and compared to the hash that was previously stored. Passwords are hashed and encrypted before being stored. In this technique, the passwords are encrypted so that even if a hacker gains access to the password database, they cannot read the passwords.
- Digital Currencies: To protect transactions and prevent fraud, digital currencies like Bitcoin also use cryptography. Complex algorithms and cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge the transactions.
- Secure web browsing: Online browsing security is provided by the use of cryptography, which shields users from eavesdropping and man-in-the-middle assaults. Public key cryptography is used by the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt data sent between the web server and the client, establishing a secure channel for communication.
- Electronic Signatures: Electronic signatures serve as the digital equivalent of a handwritten signature and are used to sign documents. Digital signatures are created using cryptography and can be validated using public key cryptography. In many nations, electronic signatures are enforceable by law, and their use is expanding quickly.
- Authentication: Cryptography is used for authentication in many different situations, such as when accessing a bank account, logging into a computer, or using a secure network. Cryptographic methods are employed by authentication protocols to confirm the user's identity and confirm that they have the required access rights to the resource.
- Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin and Ethereum to protect transactions, thwart fraud, and maintain the network's integrity. Complex algorithms and cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge the transactions.
- End-to-end Internet Encryption: End-to-end encryption is used to protect two-way communications like video conversations, instant messages, and email. Even if the message is encrypted, it assures that only the intended receivers can read the message. End-to-end encryption is widely used in communication apps like WhatsApp and Signal, and it provides a high level of security and privacy for users.
Types of Cryptography Algorithm
Cryptography Algorithms can be classified into several categories based on the way they utilize and manage their keys, their efficiency and workflow, here are the most common algorithms
- Advanced Encryption Standard (AES): AES (Advanced Encryption Standard) is a popular encryption algorithm which uses the same key for encryption and decryption It is a symmetric block cipher algorithm with block size of 128 bits, 192 bits or 256 bits. AES algorithm is widely regarded as the replacement of DES (Data encryption standard) algorithm.
- Data Encryption Standard (DES): DES (Data encryption standard) is an older encryption algorithm that is used to convert 64-bit plaintext data into 48-bit encrypted ciphertext. It uses symmetric keys (which means same key for encryption and decryption). It is kind of old by today’s standard but can be used as a basic building block for learning newer encryption algorithms.
- RSA: RSA is an basic asymmetric cryptographic algorithm which uses two different keys for encryption. The RSA algorithm works on a block cipher concept that converts plain text into cipher text and vice versa.
- Secure Hash Algorithm (SHA): SHA is used to generate unique fixed-length digital fingerprints of input data known as hashes. SHA variations such as SHA-2 and SHA-3 are commonly used to ensure data integrity and authenticity. The tiniest change in input data drastically modifies the hash output, indicating a loss of integrity. Hashing is the process of storing key value pairs with the help of a hash function into a hash table.
Advantages of Cryptography
Cryptography has some remarkable features that makes it widely adapted all over the world in different technologies, here are few points that makes it stand out:
- Cryptography can be used for access control to ensure that only parties with the proper permissions have access to a resource.
- For secure online communication, it offers secure mechanisms for transmitting private information like passwords, bank account numbers, and other sensitive data over the Internet.
- It helps in the defense against various types of assaults including replay and man-in-the-middle attacks.
- Cryptography can help firms in meeting a variety of legal requirements including data protection and privacy legislation.
Conclusion
Cryptography is used to secure information and communications by converting data into coded formats, ensuring confidentiality, integrity, and authentication. It is essential for a wide range of applications, including securing online transactions, web browsing, passwords, digital currencies, and authentication.
Cryptography continuously evolves to stay ahead of security threats, offering solutions such as symmetric key encryption (AES), asymmetric key encryption (RSA), and hash functions (SHA) to ensure data privacy and integrity.
With its widespread applications in fields like secure web browsing, cryptocurrencies, electronic signatures, and end-to-end encryption, cryptography plays a vital role in protecting sensitive data from malicious actors. As digital threats continue to rise, cryptography ensures that only authorized parties can access, modify, or transmit critical information securely.
Similar Reads
Cryptography Tutorial
Cryptography is a technique of securing communication by converting plain text into unintelligible ciphertext. It involves various algorithms and protocols to ensure data confidentiality, integrity, authentication, and non-repudiation. The two primary types of cryptography are symmetric key cryptogr
7 min read
Classical Encryption Techniques
Block Cipher , DES and AES
Public Key Cryptography and RSA
Comman Cryptography
Custom Building Cryptography Algorithms (Hybrid Cryptography)
Cryptography can be defined as an art of encoding and decoding the patterns (in the form of messages). Cryptography is a very straightforward concept which deals with manipulating the strings (or text) to make them unreadable for the intermediate person. It has a very effective way to encrypt or dec
15+ min read
An Overview of Cloud Cryptography
Cloud cryptography is a set of techniques used to secure data stored and processed in cloud computing environments. It provides data privacy, data integrity, and data confidentiality by using encryption and secure key management systems. Common methods used in cloud cryptography include:Symmetric en
4 min read
Quantum Cryptography
The uncertainty principle of quantum physics builds the earliest foundations for quantum cryptography. With quantum computers of the future being expected to solve discrete logarithmic problems and the popularly known cryptography methods such as AES, RSA, DES, quantum cryptography becomes the fores
7 min read
Image Steganography in Cryptography
The word Steganography is derived from two Greek words- 'stegos' meaning 'to cover' and 'grayfia', meaning 'writing', thus translating to 'covered writing', or 'hidden writing'. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of t
8 min read
DNA Cryptography
Cryptography is the branch of science that deals with the encoding of information to hide messages. It plays a vital role in the infrastructure of communication security. The Pioneering work had been done by Ashish Gehani et al and Amin et al after Leonard Max Adleman had shown the capability of mol
12 min read
Caesar Cipher in Cryptography
The Caesar Cipher is one of the simplest and oldest methods of encrypting messages, named after Julius Caesar, who reportedly used it to protect his military communications. This technique involves shifting the letters of the alphabet by a fixed number of places. For example, with a shift of three,
11 min read
One Time Password (OTP) algorithm in Cryptography
Authentication, the process of identifying and validating an individual is the rudimentary step before granting access to any protected service (such as a personal account). Authentication has been built into the cyber security standards and offers to prevent unauthorized access to safeguarded resou
7 min read
Data Integrity in Cryptography