Cryptography

Cryptography Encryption Technique Concept

Cryptography Encryption Technique Concept

Cryptography Encryption Technique Concept – Encryption is the conversion of electronic data into another form such that it cannot be easily understood by anyone except authorized sender and receiver. The concept of Encryption came from cryptographic technology. The main function of encryption is to protect confidential data which are transferred from sender to receiver on internet media. Today encryption technique or algorithm play a vital role in security assurance of in internet media. The encryption technique possess authenticity, integrity and Non – repudiation. The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks.

How Encryption Technique Works?

The confidential data or say plaintext is encrypted using encryption algorithm to form Cipher text that can be read only if it is decrypted. The cipher text with message transferred across networks but it can’t be decrypted without using key. The key is generated using complex algorithms that will be available to original receiver only. The principle technique of encryption or cryptography is so complex that the Cipher text can only be decrypted using key generated by algorithm.

In Encryption technique we must know some technical keywords which are defined below.

Private Key and Public Key – A private key is that which is kept secret on your computer and lets you read messages that are intended only for you.

A public key is a key that you can give to others such that it allows people to communicate with you in secret and check signatures from you. Here the encryption key is published for anyone to use and encrypt messages.

For what and Where Encryption is used?

  1. Government and Military Communication services.
  2. Protecting info within many kinds of Civilian systems.
  3. Protect data stored on computers and storage.
  4. To protect confidential & personal data.
  5. Mobile telephones
  6. Wireless microphones
  7. Bank automatic teller machine


Leave a Reply