cryptography
cryptography
protecting data by hiding it from anyone who isnt suppoed to see, access, or change it
broad umbrell aterm that encompasses both cryptography and cryptanalysis
cryptology
cyrptananlysis
figuring out how to access data without having necessary cryptographic key
applications of cryptography
secure communication, financial transactio, and protecting sensitive data
fundamentals of cryptography
types of cryptography
symmetric
asymmetric
cryptosystem
structure consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely
process by which a readable message is converted to unreadable form to prevent unauthorized parties from reading it
encryption
process of converting an encrypted message back to its original form
decryption
called as original message
plaintext
3 concepts of cryptosystem
private key
public key
asymmteric key that allows users to encrypt information using shred keys
when should symmteric encryption be used
due to better perfomance and faster speed, it is typically used fro bulk encyrption of large amounts of data for database encryption
how does symmetric encryption work
method used by Caesar to secretly communicate with his generals
Caesar cipher
is numbe of sequencer of steps that is used to convert plaintext information into ciphertext
cipher
how does asymmetric encryption work
is numbe of sequencer of steps that is used to convert plaintext information into ciphertext
how does asymmetric cryptography works
asymmetric cryptography process