We earn commission when you buy through affiliate links.

This does not influence our reviews or recommendations.Learn more.

It is useful to prevent unauthorized access to information.

cryptography.drawio-1-1

The word cryptography is derived from the Greek word kryptos, which means hidden.

The word crypto means hidden and graphy means writing.

I aim to provide a comprehensive overview, covering both major and minor concepts.

symmmetric-cryptography

Cryptography secures digital communication and information in various systems and applications, ensuring confidentiality anddata security.

It protects data from unauthorized access.

Lets see what happens in cryptography:

Now, lets explore the fundamental principles of cryptography.

Symmetric-vs-Asymmetric.drawio-1

#2.Integrity: Information cannot be altered during storage or transmission without detection of any changes.

#3.Non-repudiation: The sender cannot deny sending the information later on.

Before we continue, lets go over some basic vocabulary.

Hash-Function-new.drawio-1

This way, the receiver gets the original information from the secret code.

But, the secret key needs to be confidential.

To maintain confidentiality and integrity, both parties must securely manage and protect this secret key.

challenges-in-cryptography-geekflare

RC4 is a Stream Cipher.

Strong key management practices and secure key exchange methods can help overcome some of the challenges of symmetric cryptography.

This is useful for safe communication, as recipients only need your public key.

It eliminates the risk of sharing a secret symmetric key.

These public-key algorithms use a pair of keys for securing data.

They dont encrypt data.

These codes are called hash codes, hash values, or message digests.

The recipient can recalculate the code of the data they received and check it against the one sent.

If the codes match, it means the data stayed safe during transmission and storage.

Yet, theres much more to discover.

Next up, Cloud Cryptography:An Introductory Guide and Google Cloud Case Study.