Cryptography and Its Types - GeeksforGeeks
Cryptography and Its Types - GeeksforGeeks
Cryptography and Its Types - GeeksforGeeks
Related Articles
codes so that only those person for whom the information is intended can understand
it and process it. Thus preventing unauthorized access to information. The prefix
In Cr yptography the techniques which are use to protect information are obtained
from mathematical concepts and a set of rule based calculations known as algorithms
to conver t messages in ways that make it hard to decode it. These algorithms are used
for cr yptographic key generation, digital signing, verification to protect data privacy,
web browsing on internet and to protect confidential transactions such as credit card
In today ’s age of computers cr yptography is of ten associated with the process where
an ordinar y plain text is conver ted to cipher text which is the text made such that
intended receiver of the text can only decode it and hence this process is known as
encr yption. The process of conversion of cipher text to plain text this is known as
decr yption.
1. Confidentiality:
Information can only be accessed by the person for whom it is intended and no
2. Integrity:
We
3.use cookies to ensure you have the best browsing experience on our website. By using our site, you
acknowledge that
Non-repudiation:
https://www.geeksforgeeks.org/cryptography-and-its-types/ 1/5
21/07/2021 Cryptography and its Types - GeeksforGeeks
4. Authentication:
information is confirmed.
Types Of Cr yptography:
It is an encr yption system where the sender and receiver of message use a single
common key to encr ypt and decr ypt messages. Symmetric Key Systems are faster
and simpler but the problem is that sender and receiver have to somehow exchange
key in a secure manner. The most popular symmetric key cr yptography system is
2. Hash Functions :
There is no usage of any key in this algorithm. A hash value with fixed length is
calculated as per the plain text which makes it impossible for contents of plain text
to be recovered. Many operating systems use hash functions to encr ypt passwords.
Under this system a pair of keys is used to encr ypt and decr ypt information. A public
key is used for encr yption and a private key is used for decr yption. Public key and
Private Key are different. Even if the public key is known by ever yone the intended
receiver can only decode it because he alone knows the private key.
Attention reader! Don’t stop learning now. Practice GATE exam well before the actual
exam with the subject-wise and overall quizzes available in GATE Test Series Course.
Learn all GATE CS concepts with Free Live Classes on our youtube channel.
Like 0
Previous Next
We use cookies to ensure you have the best browsing experience on our website. By using our site, you
acknowledge that
you have read and understood our
Cookie Policy &
Privacy Policy
ADVERTISEMENT BY ADRECOVER
Got It !
https://www.geeksforgeeks.org/cryptography-and-its-types/ 2/5