Cryptographic
Science of protecting information by transforming it into a
secure format. It ensures that data is kept confidential, authentic,
andsafe from tampering or theft—especially when stored or
transmitted across networks.
Purpose of cryptographic techniques
To protect data at rest and in transit
Cryptographic Techniques
Ciphers
Algorithms that transform readable text (plaintext) into
unreadable text (ciphertext)
Types of ciphers
Symmetric Encryption (AES)
Symmetric encryption uses the same key for both encryption and
decryption.
* AES (Advanced Encryption Standard): Encrypts data in blocks. Used in
Wi-Fi security (WPA2/WPA3), cloud storage, and banking systems.
Pros of Symmetric Encryption
Fast and efficient. Suitable for large volumes of data
Cons of Symmetric Encryption
Key distribution is a challenge: both sender and receiver must
securely share the same key
Asymmetric Encryption (ECDH, ECDSA, RSA
Uses a pair of keys: a public key for encryption and a
private key for decryption.
* RSA: Used for secure data transmission and digital signatures. Example:
Verifying software authenticity.
* ECDH (Elliptic Curve Diffie–Hellman): Used for secure key exchange. Example:
Messaging apps like Signal use ECDH to establish secure sessions.
* ECDSA (Elliptic Curve Digital Signature Algorithm): Verifies authenticity of digital
messages. Example: Blockchain transactions use ECDSA for signature
verification.
Pros of Asymmetric Encryption
Solves the key distribution problem. Enables digital signatures and
secure key exchange
Cons of Asymmetric Encryption
Slower than symmetric encryption. More computationally
intensive
Hashing Functions
Hashing functions convert data into a fixed-length string (hash) that
represents the original data. Hashing is one-way and cannot be reversed to the original data
* SHA-256: Common hashing algorithm used for password storage and
data integrity.