Date First Published: 8th February 2024
Topic: Cybersecurity
Subtopic: Security Mechanisms & Technologies
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 4/10
Learn about what cryptography is in this article.
Cryptography is the practice of securing information by transforming it into a secure format. This ensures that only the person who is meant to see the information can view it and no unintended recipients can understand it. Cryptography is important for data protection, confidentiality, data integrity, and authentication.
Cryptography includes techniques, such as microdots, merging words with images, and other ways to hide information when stored or transmitted. Examples of cryptography techniques include:
Principles of cryptography include:
Attackers can bypass cryptography using brute-force attacks and gain unauthorised access to computers that are responsible for encryption and decryption. Since computers can process billions of calculations per second, they can even break complex algorithms within a few seconds. However, cryptography makes it harder for attackers to access messages and data protected by encryption algorithms. Modern cryptography involves developing encryption algorithms that are difficult for even the most powerful computers to crack.
The main difference between cryptography and encryption is that cryptography is the science of securing information by transforming it into a secret code, whilst encryption is a method of encoding sent information into random characters and symbols. Encryption is just one form of cryptography.
Before the modern era, cryptography focused on message confidentiality. This included the conversion of messages from a readable form into an unreadable one. This ensures that it cannot be read by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). Encryption attempted to ensure secrecy in communications, such as those of spies, military leaders, and diplomats.
In the last few decades, cryptography has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, secure computation, and more.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection