Initial idea 1

                                             Initial Idea 1:

The idea that I have chosen for my initial idea 1 is cryptography. It is an extremely essential part of security services including information security, cyber security, and infrastructure security. The reason behind this topic is that I want to excel in information security and it is very important for any computing individual to learn cryptography for security management. 

                                         Cryptography:

Cryptography is an information security tactic used to protect enterprise information and communication from cyber threats through the use of codes. This technique is divided into two parts: encryption (writing secret codes) and decryption (solving the codes). Cryptography is one of the most crucial aspects of computers since it ensures that data is safe and secure. Technology would be extremely different if cryptography did not exist. cryptography or secret codes are basically fundamental information security tools that are useful for providing integrity and confidentiality and other various vital security functions.

 

                                   METHODS OF CRYPTOGRAPHY :


Cryptography is inextricably linked to cryptology and cryptanalysis. It covers techniques such as microdots, combining words and images, and other methods for concealing data in storage or transport. However, in today's computer-centric world, cryptography is most commonly linked with scrambling plaintext (ordinary text, also known as clear text) into ciphertext (a process known as encryption), then back again (a process known as decryption). Cryptographers are professionals who work in this sector. 

                             History of cryptography

The word "cryptography" is derived from the Greek kryptos, meaning hidden.

The prefix "crypt-" means "hidden" or "vault," and the suffix "-graphy" stands for "writing."

Cryptography was first used during world war  to pass secret codes between the intelligence bureau and officials of armies. They used pen and paper to pass secret messages which is called encrypting and the reader will try to break those code which is called decryption.

In world War II, The Germans used machines to encrypt the messages to give attacks plans during wartime in Britain. The machine was so strong that it was unable to decrypt that message easily. After those unsuccessful attempts, Britain mathematicians developed a machine to decrypt the code and finally the attacks were put to halt.

                             Technique of cryptography:

1. SYMMETRIC ENCRYPTION:

Single-key or symmetric-key encryption techniques generate a block cypher with a set length of bits and a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decrypt it. The Advanced Encryption Standard (AES) is an example of symmetric-key encryption. The National Institute of Standards and Technology (NIST) created AES as a Federal Information Processing Standard (FIPS 197) in November 2001 to protect sensitive information. The standard is mandated by the government of the United States and is widely used in the commercial sector.

 

2. ASYMMETRIC ENCRYPTION: 

Public-key or asymmetric-key encryption techniques encrypt messages with a public key associated with the creator/sender and decrypt that information with a private key known only to the originator (unless it is exposed or they want to share it). One of the examples is the RSA algorithm.

    

                        TYPES OF CRYPTOGRAPHY:

1.  secret key Cryptography:

                                             Only one covert digital key is used in this sort of cryptography. For encryption and decryption, the same digital key is utilised. When the original data sender sends the information, he uses the same key to encrypt it into an unreadable format, and the recipient uses the same key to decrypt the data into a readable format. This is a straightforward method of cryptography with one major flaw. The distribution of a single key may allow for abuse.

2.Public-key cryptography
                                       The public digital key cryptography concept, as opposed to the secret digital key cryptography concept, employs a pair of digital keys.
The two-key mechanism makes it possible for the parties to communicate more securely. Each communication party has a pair of keys in this sort of cryptography. One key is deemed private, while another is considered public. They all have access to the public key. When delivering information, the sender will encrypt it with the public key.
When the recipient receives the encrypted data, he uses his secret key to decrypt it into a readable format.

3.Hash functions
                             Because it uses a set length hash value encrypted into plain text, this method of encryption does not require a digital key. The hash key's function is to ensure that the original information is not tampered with. This encryption is one-way. It facilitates communication by utilising algorithms. The hash key often offers a digital fingerprint, ensuring that the file is not corrupted or virus-infected. The hash key also aids computer administrators with password encryption.

 

                           cryptosystems:

Cryptosystems are being made to secure information and data from breaches and hacking. This uses cipher and deciphering process to secure the data. A few of the cryptosystems are :

1. Simple substitution.

2. One-time pad.

3. Code books.

                                       PRINCIPLE OF CRYPTOGRAPHY :

Cryptographic principles are the fundamental concepts and techniques that are used in the field of cryptography to secure communication and protect data. These principles include 

 
  1. Confidentiality. The knowledge is incomprehensible to anyone who was not intended to receive it.
   2. Integrity. The information cannot be altered while in storage or transit between the sender and the intended receiver without being discovered.
   3. Non-repudiation. The information's creator/sender cannot later disavow their intentions in creating or transmitting the information.
    4. Authentication. The sender and receiver can validate each other's identities as well as the information's origin/destination.

 

                          


References: Richards,K.(September 2021)Techtarget Available at: https://www.techtarget.com/searchsecurity/definition/cryptography (Accessed date: 8 may 2023)

 Kumar, S. (10 JANUARY 2023) Tutorialspoint. Available at: https://www.tutorialspoint.com/fundamental-cryptographic-principles (Accessed date:28 April 2023)

Stamp, M., 2011. Information security: principles and practice. John Wiley & Sons.

Gençoğlu, M.T., 2019. Importance of cryptography in information security. IOSR J. Comput. Eng, 21(1), pp.65-68.

Comments

Popular Posts