Skip to main content

Cryptographic Security

Cryptography... 




Cryptography the use of codes or ciphers to protect the secrecy of a message or data or any short of communication between two parties or a group of people.The history of cryptography began way back in the medieval period where messages were carved in caves in a way that it was readable to only those who had access to the codes or who knew what those symbols mean. Cryptography has traveled a long journey from  Classic Cryptography  using pen and paper to solving complex mechanical encryption such as the Enigma Rotor Machine


How Cryptography works?


The modern cryptography or encryption over data is achieved by using algorithms (cryptographic algorithms are designed to convert letters or numbers or words or any kind of data into an encrypted/decrypted form using a specific key) . In this algorithm method ,the sender has an algorithm the sender feeds some data to the encryption algorithm as an input and then the sender sets a key(decided between both the sender and the receiver)and then the algorithm outputs an encrypted version of the data, the encrypted data is then send via the web to the receiver, now the receiver feeds the decryption algorithm the encrypted data as an input enters the key which was decided between the sender and the receiver and the decryption algorithm outputs the decrypted data.


What is the use of such Cryptographic system?


 This digital age comes with a lot of benefits as well as with the same amounts of risks too. Once we are out in the web or online our presence in the internet or the web is as same as once we are out of our homes in the streets the things we do ,the places we go,people we meet or whatever we do can be monitored by an adversary(so called hackers) if he/she wants to . In such a open web we need a secure system in order to be safe and be protected from the adversary ,this is where cryptography comes into play. Securing the whole internet is not possible as it is a big chain of interconnecting dots or data that increases even as you read . So we instead can secure our data our presence in the online world through cryptographic method, in this form the data itself is not transferred but it's the encrypted data that travels here and there .In this method even if the adversary get access to the data it is nothing more than gibberish to him/her.unless the adversary has the key.  



"Security is always excessive until it's not enough."
                                     Robble Sinclair

Comments

Popular posts from this blog

Privacy and Confidentiality

Differences Privacy : Basically the term privacy refers to keeping your information yours or limiting it to close family or your friends or your contacts,  Whereas on the other hand,  Confidentiality: talks about that a subjects information will stay a secret but this time from the perspective of the person receiving that information.  For example : on any social media platform we tend to share our information to limited or specific people or groups that is a matter of privacy concerns, but the same when it is about our passwords, our biometrics, our messages ,ATM pins, CVV these are all confidential information. These are some basic terms but play a vital role in our everyday lives , we all need privacy we don't want anyone sniffing our day to day activities we all want our space and that's the reason why being secure not just online but offline too is needed. Because privacy is not just  what we demand for its a right we all have. #RightToPrivacy ...

CyberAwareness

Cyber Security One of the most fundamental terms used by many practiced by none. We often use this heavy term to designate ourselves with the modern growing digital world.  Every single device in today's world is related to our lives one way or the other each of these devices know our day to day activities as they make our lives simpler as for example we often use Google Maps to find our way around day to day ,we use certain apps that manage our daily activities as they keep a track of our activities on daily basis. Now comes a bitter part if an intruder or maybe someone else get a hand on these apps identifying them as you gets to know everything that app knows about you everything from morning to evening, where we stay ,what we watch , what we do, our credit card details and many more.  In this digital age things have been a bit easier no doubt but at a big risk . Being secure in the digital age is very essential .Being a part of this day to day digital age we ha...

Critical Urban Infrastructure

  Urban Infrastructure is at a critical stage from a cybersecurity perspective. When we mostly talk about cybersecurity, we take computers into play, mobile devices, IOT’s but the infrastructure well unfortunately no we never even think that the infrastructure is at a potential risk. As Infrastructure is also a tempting place for adversaries. Not just the infrastructure but the Urban-Infrastructure, as living in the digital age just how everything seems to be so easily available and accomplished it is even for those sneaky adversaries whose only intention is to compromise the system in any way possible and just for information every single system infrastructure that we use in our day-to-day commute including communications, money dispensers, banks, waste management, cabs, traffic signals, vehicles, electricity, water, health care and well everything is controlled digitally one way or the other. And in an Urban Infrastructure everything will be as easy as a push of a button (no...