Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cryptography and Types Encryption and Decryption...


     

   Subscribe/Renew Journal


When we are talking about communication over a network, we need to make sure that there is some sort of security for the information being communicated. Security has to be provided since the information is vulnerable. Cryptography is a powerful technique that can be used for ensuring security. Cryptography provides a way of network security which deals with hiding "real" information from others while transmitting between two parties. Usually, the real information is transformed or hidden into another message and transmitted over the network. This transformed message in itself will make no sense even if any hacker gets hold of this information. Converting real information into what looks like garbage value this process is called as Encryption, the process of extracting real information back from this meaningless text is called as Decryption. This whole encryption and decryption strategy is based on the premise that both sender and receiver share some unique keys which is not known by any outsiders, like the hackers. Based on keys there are two types of Cryptography methods Symmetric and Asymmetric cryptography.


Keywords

Cryptography, Symmetric Key, Asymmetric Key Cryptography, Public Key Cryptography, Private Key Cryptography
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 213

PDF Views: 2




  • Cryptography and Types Encryption and Decryption...

Abstract Views: 213  |  PDF Views: 2

Authors

Abstract


When we are talking about communication over a network, we need to make sure that there is some sort of security for the information being communicated. Security has to be provided since the information is vulnerable. Cryptography is a powerful technique that can be used for ensuring security. Cryptography provides a way of network security which deals with hiding "real" information from others while transmitting between two parties. Usually, the real information is transformed or hidden into another message and transmitted over the network. This transformed message in itself will make no sense even if any hacker gets hold of this information. Converting real information into what looks like garbage value this process is called as Encryption, the process of extracting real information back from this meaningless text is called as Decryption. This whole encryption and decryption strategy is based on the premise that both sender and receiver share some unique keys which is not known by any outsiders, like the hackers. Based on keys there are two types of Cryptography methods Symmetric and Asymmetric cryptography.


Keywords


Cryptography, Symmetric Key, Asymmetric Key Cryptography, Public Key Cryptography, Private Key Cryptography