0% found this document useful (0 votes)
30 views3 pages

86-Cryptography Concepts

The document discusses cryptography concepts including encryption, decryption, plaintext, and ciphertext. It defines key terms like encryption as converting plaintext to ciphertext, and decryption as converting ciphertext back to plaintext. Encryption algorithms scramble data while decryption algorithms recover the original data.

Uploaded by

eshensanjula2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views3 pages

86-Cryptography Concepts

The document discusses cryptography concepts including encryption, decryption, plaintext, and ciphertext. It defines key terms like encryption as converting plaintext to ciphertext, and decryption as converting ciphertext back to plaintext. Encryption algorithms scramble data while decryption algorithms recover the original data.

Uploaded by

eshensanjula2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cryptography Concepts:

o Network traffic protects, traversing on Internet through cryptographic methods.


o The network term cryptography is a Greek word, which means "Secret Writing".
o Kryptos, means hidden or secret while the Graphein word, means the Writing.
o In Network, Cryptography involves the process of encryption and decryption.
o Cryptography is the study and practice of hiding the data and the information.
o Cryptography is the art, study and science of making the data impossible to read.
o Cryptographic algorithms start with plaintext and scramble to unreadable format.
o Encryption algorithm specify how ciphertext can be decrypted back into plaintext.
o Cryptography is essential part of provide confidentiality, integrity & authentication.
o Cryptography is a way and method to keep the messages and other data secret.
o Caesar cipher encryption algorithm is one of the simplest encryption algorithms.
o In this Caesar algorithm every alphabetical character in the plain text is replaced.

Cryptography Terminologies:
Below are some important terminologies to understand Cryptography.

Plaintext:
o The information in its original form or readable data also known as cleartext.
o Plaintext is a text, in natural readable form; it is the data before it is encrypted.
o In simple words, Plaintext or cleartext is original message, information or data.

Ciphertext:
o An encrypted message is called cipher text, Ciphertext is encrypted text.
o The Ciphertext is unreadable until it has been converted into the plain text.
o Sometimes it has the same size as plaintext, or can be larger than plaintext.
o Cipher text is unreadable by anyone except the intended recipients only.
o Cipher text is scrambled message, information or data produced as output.

1 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Encryption:
o The process of changing the plaintext into ciphertext is called encryption.
o The process of converting plaintext into the ciphertext is called encryption.
o The encryption process is the translation of data or info into a secret code.
o Encryption is two-way function; encrypted can be decrypted with proper key.
o Encryption is a two-way function, that includes encryption and decryption.
o Encryption is the most effective way to achieve data or information security.
o The main idea of encryption is to protect data from an unauthorized person.
o Encryption process needs an algorithm which called a cipher and a secret key.

Decryption:
o The process of changing the ciphertext into the plaintext is called decryption.
o The process of converting cipher text back to the original plaintext is decryption.

Encryption Algorithm:
o Algorithm defines how data is transformed when plaintext data scrambled to ciphertext.
o An encryption algorithm is the method used to transform data into the hidden ciphertext.
o Also known as cipher, algorithms are the rules or instructions for the encryption process.
o Both data sender & the recipient must know the algorithm used for data transformation.
o Recipient should use same algorithm to decrypt ciphertext back into original plaintext data.
Decryption Algorithm:
o It accepts cipher text as input and the matching key and produces the original plain text.
o Decryption algorithms specify data & key encryption algorithms that are used to decrypt.

2 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


3 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy