(m)
Cryptography (or cryptology; derived from Greek κρυπτός kryptós "hidden," and the verb γράφω gráfo "write") is the study of message secrecy. In modern times, it has become a branch of information theory, as the mathematical study of information and especially its transmission from place to place. The noted cryptographer Ron Rivest has observed that "cryptography is about communication in the presence of adversaries." It is a central contributor to several fields: information security and related issues, particularly, authentication, and access control. One of cryptography's primary purposes is hiding the meaning of messages, not usually the existence of such messages. Cryptography also contributes to computer science, central to the techniques used in computer and network security for such things as access control and information confidentiality. Cryptography is also used in many applications encountered in everyday life; the security of ATM cards, computer passwords, and electronic commerce all depend on cryptography.
In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge, sometimes referred to as scrambling. Encryption has been used to protect communications for centuries, but only organizations and individuals with an extraordinary need for secrecy had made use of it. In the mid-1970s, strong encryption emerged from the sole preserve of secretive government agencies into the public domain, and is now used in protecting widely-used systems, such as Internet e-commerce, mobile telephone networks and bank automatic teller machines.
Encryption can be used to ensure secrecy, but other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message; for example, a message authentication code (MAC) or digital signatures. Another consideration is protection against traffic analysis.
Encryption or software code obfuscation is also used in software copy protection against reverse engineering, unauthorized application analysis, cracks and software piracy used in different encryption or obfuscating software.
2007-01-04 22:48:05
·
answer #1
·
answered by mallimalar_2000 7
·
2⤊
0⤋
Cryptography is the combined term for Encryption and decryption
Without going into much details how they are done their explaination is -
there is plain text that is readable to you, a cypher text after applying encryption ie you have converted the plain text to some other character that are not readable to the other. This is Encryption.
the converse of this obiviously would be decryption of cypher to the plain text.
Now what you need for Encryption, A encryption algorithm, A key, and A decryption algorithm
The keys are kept secret as you keep you atm pin secret to you or any other.... There are many algorithms work differently some how broadly classified as Symetric(or private key) Cryptographic Algorithm and Asymmetric (or public key) Cryptographic Algorithm.
In Symmetric one you have a key that is generally shared by parties among which data is to be kept secret. The algorithm can be used uniquely by several person but the locking and unlocking key will be different among different paties. Each party is however using same key. ITs called Symmetric because the key that is used to encrypt is also used to decrypt.
However the case is different in Asymmetric one where a pair of public and private key is used, lets assume two user A and B in a party. User A wants to send data to User B, lets see how it works in case of asymmetric ones, User B will have a pair of key as told above, a public and private key, this public key is announced publicly and will be used by user A to encrypt data and is send to USer B then, now only user B has its private key and can unlock the data using private key. that is encryption using publeic key and decryption using private key. and thus called Asymmetric Cryptography. The rules actually works because of Mathematical formula's. the easiest to understand logically is RSA method
Actully there is one more HAshing
Some of the algorithms are
Symmetric Algo's : - SUbstitution, DES(Digital Encryption Standard)
Asymetric: RSA
Assymetic
2007-01-06 18:09:03
·
answer #2
·
answered by Saurabh khatri 2
·
0⤊
0⤋
Cryptography (or cryptology; derived from Greek κÏÏ
ÏÏÏÏ kryptós "hidden," and the verb γÏάÏÏ gráfo "write") is the study of message secrecy. In modern times, it has become a branch of information theory, as the mathematical study of information and especially its transmission from place to place.
In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge, sometimes referred to as scrambling. Encryption has been used to protect communications for centuries, but only organisations and individuals with an extraordinary need for secrecy had made use of it. In the mid-1970s, strong encryption emerged from the sole preserve of secretive government agencies into the public domain, and is now used in protecting widely-used systems, such as Internet e-commerce, mobile telephone networks and bank automatic teller machines.
2007-01-04 22:50:44
·
answer #3
·
answered by FARIDA H 2
·
0⤊
0⤋
Cryptography
The discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification, or prevent its unauthorized use.
encryption
Any procedure used in cryptography to convert plaintext into ciphertext in order to prevent anyone except the intended recipient from reading that data. There are many types of data encryption, and they are the basis of network security. Common types include Data Encryption Standard and public-key encryption.
2007-01-05 09:47:14
·
answer #4
·
answered by Vinothbabu 3
·
0⤊
0⤋
hello....
cryptography : is the science of making secured message transactions or communication
it mailny involves two process..
""" encryption and decryption.."""
while former deals with converting original DATA into unintelligible one so any middle person or spy could not understand
the latter is the reverse of the former
onepoint: both parties that is the sender and receiver should have the same kind of algorithms to encode and decode
some algorithms are like AES,DES,etc
2007-01-05 15:49:53
·
answer #5
·
answered by Nizam@niji 3
·
0⤊
0⤋
Both are related to hiding data
cryptography is the art of hiding dta
and encryption is one method in cryptography
2007-01-04 22:50:55
·
answer #6
·
answered by ALMIGHTY 3
·
0⤊
0⤋
code
2007-01-04 22:45:35
·
answer #7
·
answered by wyzrdofahs 5
·
0⤊
0⤋