Encrypted emails and hashed passwords have long been a part of everyday life for those who prioritize their online security. But how exactly does modern cryptography work? And what are the advantages and disadvantages of relying on these security techniques?
How does Cryptography work?
Cryptography refers to the creation of a secure means of communication through use of an algorithm and a decryption key. In most cases, that involves scrambling text until it is unreadable, while still being able to reverse that process if you or someone you trust needs to see it. The vital aspects of cryptography are the complexity of the algorithm used in the scrambling process, and the key needed to decode the message. The more complex the algorithm, the stronger the encryption.
The algorithms used thousands of years ago would been involved rearranging or shifting letters within the original alphabet. But modern algorithms aren’t limited by a 26-character alphabet, so the strength and complexity of today’s digital cryptography can be practically unbreakable.
Before a written message is encrypted, it’s referred to as plaintext. After encryption, the remaining gibberish is called ciphertext.
Types of Cryptography
There are three main types of cryptographic algorithms, each with a specific purpose.
- Secret Key. This is often referred to as symmetric encryption, because it’s the same key to encrypt and decrypt the data. This form involves one or more parties having access to the same decryption key. The key can only be shared by the original holder.
- Public Key. Also known as asymmetric encryption, due to the need for two different keys. One user has a key that encrypts the message, while another has the decryption key alternative. Once the first key has been used to turn the plaintext into ciphertext, the same key can’t be used to decrypt it. The sender will always have access to the public key, and the receiver will have the tools to decrypt the message.
- Hash functions. This is a one-way encryption tool. What’s the point of an algorithm that encrypts and doesn’t decrypt? It serves as an authenticator, of sorts. It’s used to make sure a file hasn’t been changed or altered. A hashing algorithm will convert data into a fixed-length string of text called a hash value. The hash value of that data is then checked against the stored hash value in whatever service the user wants to access. If the hash values match, then access is granted. Each file will have a unique hash value, almost like a barcode.
- Password Cracking
- Network Hacking
Comments
Post a Comment