English Writings

Introduction to Cryptography for the rest of us

English: Public key encryption diagram: email ...

Every day, we are being introduced with new and innovative technologies involving online file management and Knowledge Management. IT guys, are trying to implement this technologies to their daily work to improve or accelerate their productivity and efficiency without compromising security. While this may not be a big deal for a business with 5-10 people, it may introduce problems when the small “family” firm starts growing.

Cryptography, from Greek κρυπτός, (“hidden secret”) and γράφειν, (“writing” ) is the practice and study of techniques for secure communication in the presence of third parties. Usually this involves communicating through sophisticated protocols and softwares that compile with some general rules of this extremely broad science.

While you may not be interested to learn more about Cryptography, you should at least know the basic terminology and the types of cryptography so that you can be comfortable when reading articles on this matter.

Basic Terminology

  • Encryption : Encryption is to convert the data in some unreadable form.
  • Authentication:  Authentication ensures that the message was originated from the originator claimed in the message.
  • Integrity: Integrity ensures that the messages that are received by the receiver are not altered anywhere on the communication path.
  • Non Repudiation: Non Repudiation provides proof of the origin of data and high assurance to be genuine through the use of digital signatures.

Types of Cryptography

  • Secret key Cryptography (symmetric encryption): The sender applies a key to encrypt a message while the receiver applies the same key to decrypt the message.
  • Public key cryptography (asymmetric encryption): Each party has a private key and a public key. The private key is secret and is not revealed while the public key is shared with all participants in the communication.
  • Hash Functions: This technique does not involve any key. Rather it uses a fixed length hash value that is computed on the basis of the plain text message and are used to check the integrity of the message to ensure that the message has not been altered, compromised.

For more please read the detailed article on “The Geek Stuff” here : “Introduction to Cryptography Basic Principles

21 Comments

  1. Eduarda

    i always learn something new from your post!

  2. Elen

    it sure helped me a lot as well. this is not an easy topic, but you make it easy to be understood. thank you so much!

  3. Araci

    yeah i really liked reading this article.

  4. Dantela

    wow! thanks for sharing this information! this is great and i enjoyed sharing with my friends.

  5. Yung Henton

    I found you are website via Yahoo and I have to express. A Gigantic Many thanks very much, I considered your article was very interesting I’ll get back to see what more great information I will receive here.

  6. Benete

    this is perfect, i am looking to do something similar very soon and this article makes perfect sense.

  7. Evita

    hope you can update more and better stories.

  8. Isabela

    sounds great!

  9. Catalina

    your website is the most informative. i loved your website a lot. thank you.

  10. Elina

    maybe if you write more about this subject, i will understand it clearer.

  11. Diana

    this is very nice one and gives in depth information. i think it will be helpful. thank you very much for that extraordinarily first class editorial! keep up the good work.

  12. Daiane

    looking forward to another great article. good luck to the author! all the best!

  13. Eloides

    please keep posting those great articles, your readers thank you so much for that, as we can always learn something new from your articles.

  14. Akiko

    liked it so much, thank you.

  15. Anunciação

    well done.

  16. Brigite

    your post is interesting and useful

  17. Cris

    good points

  18. Elvira

    your website is so organized, and your posts are always common sense, congratulations for making the difference.

  19. Chaiane

    good post keep posting..

  20. Disney

    just want to say something about your post! i am really impressed by it. i hope to catch such interesting ideas!

  21. Amanda

    keep doing a good work please.

Leave a Reply