‘Crypto’ means secret or hidden. Cryptography is the science of secret writing with the intention of keeping the data secret.
Types :
1. Symmetric Cryptography : Plain text + Cipher (Password – Key) — > Cipher Text (Encryption)
Ciphertext – cipher (Password – same key used for encryption) — > Plain Text ( Decryption)
Ex : Ciphers – DES, 3DES, AES…. etc.,
2. Asymmetric Cryptography ( 2 different keys ) – (Private & Public key) : Private key is a master key
with help of private key you can create public key (public key is – used only for authentication)
Private can revoke any time the public key
Ex: Ciphers – RSA , DSA, Blowfish etc.
‘Crypto’ means secret or hidden. Cryptography is the science of secret writing with the intention of keeping the data secret. Types :
1. Symmetric Cryptography : Plain text + Cipher (Password – Key) — > Cipher Text (Encryption)
Ciphertext – cipher (Password – same key used for encryption) — > Plain Text ( Decryption)
Ex : Ciphers – DES, 3DES, AES…. etc.,
2. Asymmetric Cryptography ( 2 different keys ) – (Private & Public key) : Private key is a master key
with help of private key you can create public key (public key is – used only for authentication)
Private can revoke any time the public key
Ex: Ciphers – RSA , DSA, Blowfish etc.,
3. One Way Hashing :
A one-way hash function is a mathematical function that generates a fingerprint of the input, but there is no way to get back to the original input.
If the input is the same then the hash is always the same, if it changes at all, even by one character the output hash is completely different.
A hash can be used to verify that input A is identical to input B but cannot be used to get the input back from the output like with another mathematical function, encryption.
Ex: Passwords hash stored in Databases
if the developers used hash algorithm in their application, when we creating it accounts in it, it will create hash code , which is saved in the database, this hash code function is developed by developer no one out of the world will knows even developer too.
when we login , password submitted in the form of hash values in background and submitted to server if the password is same as password hash then it will give access to login to server or application