0% found this document useful (0 votes)
14 views

Applications_of_Cryptography

Uploaded by

2648manna
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Applications_of_Cryptography

Uploaded by

2648manna
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Applications of Cryptography:

 Computer passwords: Cryptography is widely utilized in computer security, particularly when


creating and maintaining passwords. When a user logs in, their password is hashed and compared to
the hash that was previously stored. Passwords are hashed and encrypted before being stored. In this
technique, the passwords are encrypted so that even if a hacker gains access to the password database,
they cannot read the passwords.
 Digital Currencies: To protect transactions and prevent fraud, digital currencies like Bitcoin also use
cryptography. Complex algorithms and cryptographic keys are used to safeguard transactions, making
it nearly hard to tamper with or forge the transactions.
 Secure web browsing: Online browsing security is provided by the use of cryptography, which
shields users from eavesdropping and man-in-the-middle assaults. Public key cryptography is used by
the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt data sent
between the web server and the client, establishing a secure channel for communication.
 Electronic Signatures: Electronic signatures serve as the digital equivalent of a handwritten signature
and are used to sign documents. Digital signatures are created using cryptography and can be validated
using public key cryptography. In many nations, electronic signatures are enforceable by law, and their
use is expanding quickly.
 Authentication: Cryptography is used for authentication in many different situations, such as when
accessing a bank account, logging into a computer, or using a secure network. Cryptographic methods
are employed by authentication protocols to confirm the user’s identity and confirm that they have the
required access rights to the resource.
 Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin and Ethereum to
protect transactions, thwart fraud, and maintain the network’s integrity. Complex algorithms and
cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge
the transactions.
 End-to-end Internet Encryption: End-to-end encryption is used to protect two-way communications
like video conversations, instant messages, and email. Even if the message is encrypted, it assures that
only the intended receivers can read the message. End-to-end encryption is widely used in
communication apps like WhatsApp and Signal, and it provides a high level of security and privacy
for users.

Types of Cryptography Algorithm


 Advanced Encryption Standard (AES): AES (Advanced Encryption Standard) is a popular
encryption algorithm which uses the same key for encryption and decryption It is a symmetric block
cipher algorithm with block size of 128 bits, 192 bits or 256 bits. AES algorithm is widely regarded
as the replacement of DES (Data encryption standard) algorithm.
 Data Encryption Standard (DES): DES (Data encryption standard) is an older encryption algorithm
that is used to convert 64-bit plaintext data into 48-bit encrypted ciphertext. It uses symmetric keys
(which means same key for encryption and decryption). It is kind of old by today’s standard but can
be used as a basic building block for learning newer encryption algorithms.
 RSA: RSA is an basic asymmetric cryptographic algorithm which uses two different keys for
encryption. The RSA algorithm works on a block cipher concept that converts plain text into cipher
text and vice versa.
 Secure Hash Algorithm (SHA): SHA is used to generate unique fixed-length digital fingerprints
of input data known as hashes. SHA variations such as SHA-2 and SHA-3 are commonly used to
ensure data integrity and authenticity. The tiniest change in input data drastically modifies the hash
output, indicating a loss of integrity. Hashing is the process of storing key value pairs with the help of
a hash function into a hash table.

Advantages of Cryptography
 Access Control: Cryptography can be used for access control to ensure that only parties with the
proper permissions have access to a resource. Only those with the correct decryption key can access
the resource thanks to encryption.
 Secure Communication: For secure online communication, cryptography is crucial. It offers secure
mechanisms for transmitting private information like passwords, bank account numbers, and other
sensitive data over the Internet.
 Protection against attacks: Cryptography aids in the defense against various types of assaults,
including replay and man-in-the-middle attacks. It offers strategies for spotting and stopping these
assaults.
 Compliance with legal requirements: Cryptography can assist firms in meeting a variety of legal
requirements, including data protection and privacy legislation.

You might also like