Cryptography Demystified: Protecting Your Digital Privacy (2024)

Today’s digital space has become flooded with doubts regarding the safety of personal information and privacy, in general. Some of these concerns have been taken care of, thanks to the adoption of cryptography and encryption. Here, you will learn about cryptography and the various aspects of it. The topics covered in this tutorial on ‘What is Cryptography’ are:

  1. What is the need for Cryptography?
  2. What is Cryptography?
  3. What are the Applications of Cryptography?
  4. What are the Different Categories in Cryptography?
  5. Historical Significance of Cryptography
  6. Demo on Cryptography
  7. How can Simplilearn help you?

What Is the Need for Cryptography?

Take a look at the following story to understand the need for Cryptography.

Take the example of Anne. Anne wants to look for a discount on the latest iPhone. After browsing the internet, she comes across a questionable website willing to offer a 50% discount on the first purchase.

Cryptography Demystified: Protecting Your Digital Privacy (1)

However, a few moments after she provides her payment details, the website withdraws a huge chunk of money from her account. Anne then wonders how she had failed in realizing that the website was a scam. She then notices that the website is an HTTP webpage instead of HTTPS.

Cryptography Demystified: Protecting Your Digital Privacy (2)

The payment information submitted was not encrypted and visible to anyone keeping an eye, including the website owner.

Cryptography Demystified: Protecting Your Digital Privacy (3)

If she had chosen to use a reputed website, which has encrypted transactions and employs cryptography, this iPhone enthusiast could have avoided this particular incident. This is why it's never recommended to visit unknown websites or share any personal information on them.

This is where Cryptography comes to play, and is so essential. Now you’ll go through exactly what cryptography is.

Become a Certified Ethical Hacker!

CEH v12 - Certified Ethical Hacking CourseExplore Program

Cryptography Demystified: Protecting Your Digital Privacy (4)

What is Cryptography?

Cryptography is the science of encrypting or decrypting information to prevent unauthorized access. In cryptography, you transform data and personal information to make sure only the correct recipient can decrypt the message. As an essential aspect of modern data security, using cryptography allows the secure storage and transmission of data between willing parties.

Cryptography Demystified: Protecting Your Digital Privacy (5)

Here are a few terminologies which will help you understand what cryptography is, with better clarity.

There are two primary aspects of cryptography, they are:

1. Encryption

Cryptography Demystified: Protecting Your Digital Privacy (6)

Encryption is the process of scrambling the information, to avoid third parties from comprehending the message even if it is intercepted. This scrambling is done using specific mathematical calculations and steps, often collectively known as ciphers. Along with the cipher, it uses an encryption key to encrypt the message.

2. Decryption

Cryptography Demystified: Protecting Your Digital Privacy (7)

The second part of the cryptography process is decryption. Decryption is the process of reversing the work done by encryption. It converts the scrambled information into its original form so that the data is readable again. Usually, the encryption key which is used to scramble the data can decrypt the data, but that varies depending on the type of cryptography used. Irrespective of whether or not they are the same, a key is mandatory for both the encryption and decryption of data.

In the next section of this tutorial titled ‘what is cryptography’, you will go through an example as to how you can use keys to encrypt data.

For example, jumble up the alphabets in the word ‘Simplilearn’ and someone without the necessary information cannot guess the original message just by looking at the ciphertext.

Cryptography Demystified: Protecting Your Digital Privacy (8)

You can only understand the word if you know how to decrypt the coded word, thereby reversing the work done by encryption to get back the plaintext.

Cryptography Demystified: Protecting Your Digital Privacy (9)

Taking the above example as reference, before the original message is encrypted, it is called cleartext or plaintext. After it encrypts the plaintext using the encryption key, the coded message is called the ciphertext. It can then pass the same ciphertext through the decryption key and return to the cleartext/plaintext format.

Cryptography Demystified: Protecting Your Digital Privacy (10)

Now that you understand the ‘what is cryptography’ bit and its essential functions, look at its importance and worldwide applications.

What Are the Applications of Cryptography?

Cryptography finds use in many areas, ranging from safety in payment portals, to secure messaging platforms like WhatsApp. A few of those applications are as follows -

Cryptography Demystified: Protecting Your Digital Privacy (11)

1. SSL/TLS Encryption:

Browsing the internet is secure today primarily because cryptography has allowed you to encrypt your data flow. Starting from browser identification to server authentication, encryption and cryptography, in general, have simplified online browsing.

2. Digital Signatures:

With digital contracts gaining prominence, the world was in the need of a secure channel to pass critical documents through. Cryptography helps provide a layer of authentication so you can be certain regarding the origin, confidentiality, and integrity of your documents.

3. Safe Online Banking:

Online banking services and payment applications would be an afterthought, if not for encryption of data. Cryptography has enabled authentication systems to verify the identity of certain individuals before allowing them to hold transactions and help reduce credit card fraud in the process.

4. Secure Chatting Services:

Messaging applications like WhatsApp, Telegram, and Signal have now adopted an end-to-end encryption protocol, which guarantees that no one other than the sender and receiver can read the messages. This is a huge step up from SMS days, where security was always a toss-up. Thanks to cryptography, there are a plethora of communication platforms to make use of.

5. Encrypted Emails:

With a vast amount of private information passing through your inbox, having a secure method of communication is an absolute necessity. Thanks to encryption algorithms like PGP (Pretty Good Privacy), your emails are now encrypted at all times.

6. Crypto-Currency:

With blockchain technology, cryptocurrency has seen an astronomical increase in interest rates and is still one of today’s most sought-after trade markets. A completely decentralized, secure, and tamper-proof system has found its way into today’s digital sphere, thanks to cryptography.

With so many different avenues where cryptography has found its place, its implementation is distinct. In the next section on ‘what is cryptography’, you will understand how to go ahead with it.

What Are the Different Categories in Cryptography?

Cryptography can be broadly classified into three different types -

  1. Symmetric Key Cryptography
  2. Asymmetric Key Cryptography
  3. Hashing

1. Symmetric Key Cryptography

Symmetric key cryptography is the category where the same key is used for both the encryption and decryption of information.

Cryptography Demystified: Protecting Your Digital Privacy (12)

This type of encryption is used when data rests on servers and identifies personnel for payment applications and services. The potential drawback with symmetric encryption is that both the sender and receiver need to have the key, and it should be secret at all times.

For example, as seen from the image below, if Alice wants to send a message to Bob, she can apply a substitution or shift cipher to encrypt the message, but Bob must be aware of the same key so that he can decrypt it when necessary.

Cryptography Demystified: Protecting Your Digital Privacy (13)

Symmetric key algorithms use one of the two types of Ciphers -

  • Stream Ciphers - The plaintext is converted to ciphertext bit-by-bit, one at a time.
  • Block Ciphers - The plaintext is broken down into blocks/chunks of data encrypted individually and later chained together.

The most widely used Symmetric Key Algorithms are AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple DES), Twofish, etc.

2. Asymmetric Key Cryptography

In asymmetric key cryptography, there are two keys at play. A public key and a private key. The public key is used to encrypt the data pre-transit, and the private key is used to decrypt the data post-transit.

Cryptography Demystified: Protecting Your Digital Privacy (14)

If Alice wants to communicate with Bob using Asymmetric encryption, she encrypts the message using Bob's public key. After receiving the message, Bob uses his private key to decrypt the data. This way, nobody can intercept the message in between transmissions, and they don’t need a secure key exchange for this to work.

Cryptography Demystified: Protecting Your Digital Privacy (15)

RSA encryption is the most widely used asymmetric encryption standard today. Named after its founders (Rivest, Shamir, and Adleman), it uses block ciphers that separate the data into blocks and obscure the information.

On many occasions, it is advised to use a combination of symmetric and asymmetric to achieve better speed and security. In the image below, you see the process of using both symmetric and asymmetric encryption to transfer information and secret keys privately.

Cryptography Demystified: Protecting Your Digital Privacy (16)

Follow the procedure as explained below:

Step 1: Encrypt the original message using symmetric key cryptography.

Step 2: Encrypt the key used in step one using the receiver’s public key i.e. using asymmetric key cryptography.

Step 3: Send both the encrypted message and encrypted symmetric key to the receiver.

Step 4: The receiver uses his private key to decrypt the symmetric key used to encrypt the original message.

Step 5: The decrypted key is used to convert the encrypted message back to plaintext.

3. Hashing

Hashing is the branch of cryptography that scrambles data beyond recognition. However, unlike symmetric and asymmetric key cryptography, hashing isn’t designed to be reversible. It gives an output of a fixed size, known as the hash value of the original data.

Cryptography Demystified: Protecting Your Digital Privacy (17)

You can use hash functions to scramble the data. They are not reversible and the output size of a hash function is always the same, irrespective of the size of the plaintext.

It is to be noted that cryptography isn’t entirely limited to the 21st century. There have been several occasions in history where cryptography has helped create secure channels of communication. This tutorial on ‘what is cryptography’ will take you through two such examples in the next section.

Historical Significance of Cryptography

The two most famous examples of cryptography in ancient times are -

  • Caesar Cipher
  • Enigma Machine

1. Caesar Cipher:

Julius Caesar used a substitution shift to move alphabets a certain number of spaces beyond their place in the alphabet table. A spy cannot decipher the original message at first glance.

Cryptography Demystified: Protecting Your Digital Privacy (18)

For example, if he wanted to pass confidential information to his armies and decides to use a substitution shift of +2, A becomes A+2=C, B becomes B+2=D, and so on. This cipher has been appropriately named Caesar cipher, which is one of the most widely used algorithms.

2. Enigma Machine:

The Nazi German armies used to have a machine called the Enigma during the era of the world wars. It was used to protect confidential political, military, and administrative information. It consisted of 3 or more rotors that scramble the original message typed, depending on the machine state at the time.

Cryptography Demystified: Protecting Your Digital Privacy (19)

Cryptography Demystified: Protecting Your Digital Privacy (20)

The decryption process is similar, but it needs both machines to stay in the same state before passing the ciphertext to give out the plaintext message.

Now you will go through how modern-day cryptography has helped in keeping the data secure on the internet with a demonstration of what is cryptography.

Become a Certified Ethical Hacker!

CEH v12 - Certified Ethical Hacking CourseExplore Program

Cryptography Demystified: Protecting Your Digital Privacy (21)

Demo on Cryptography

For this demo on what is cryptography, there is a web-based tool (https://www.devglan.com/online-tools/rsa-encryption-decryption) that will help you understand the process of RSA encryption. As you already probably know, the RSA encryption algorithm falls under the umbrella of asymmetric key cryptography, which implies that you have two keys at play here, the public key and the private key.

You have the choice of key size in RSA, which allows you to prioritize either speed or added complexity, depending on the requirements. Here, choose the key size as 1028 bits and generate the key pair for this example.

Cryptography Demystified: Protecting Your Digital Privacy (22)

Now, try and encrypt the word Simplilearn in this example. You have to select if the key which is being used for encryption is private or public. Since that affects the process of scrambling the information. Since you are using the public key, select the same. You also have the option of using modified ciphers, but stick to plain RSA for the time being.

Cryptography Demystified: Protecting Your Digital Privacy (23)

With the above parameter set, encrypt the data.

Cryptography Demystified: Protecting Your Digital Privacy (24)

You have to generate your ciphertext that is to be sent to the recipient of the message.

The receiver must already possess the private key generated from the same pair. No other private key can be used to decrypt the message. You must paste the private key here and select the same.

The cipher must also match the one used during the encryption process.

Cryptography Demystified: Protecting Your Digital Privacy (25)

Once you click decrypt, you can see the original plaintext.

Cryptography Demystified: Protecting Your Digital Privacy (26)

This sums up the entire process of RSA encryption and decryption.

You can also use the private key for decryption and the public key for decryption, but the appropriate checkbox must be enabled for it to work flawlessly, as shown in the image below.

Cryptography Demystified: Protecting Your Digital Privacy (27)

While this dealt with mostly theoretical concepts, have a look at a real-time example.

Here, you are going to use the software called Wireshark, which helps in analyzing network traffic from your system, so you can see what kind of data enters and leaves the machine.

Consider the website Wikipedia. Pretty standard HTTPS website where the S stands for secured. Analyze the traffic passing through the network when you use the website.

Cryptography Demystified: Protecting Your Digital Privacy (28)

You can see that there are a lot of applications running, and you see a lot of requests, so you apply a filter that only shows results for the requests generated and requested by Wikipedia. Once done, analyze some of the data packets.

Cryptography Demystified: Protecting Your Digital Privacy (29)

As you can see, there is a bunch of gibberish data here that reveals nothing you searched or read. Similarly, other secured websites function this way and it’s very difficult if at all possible, to snoop on user data.

To put this in perspective, consider an HTTP website (http://www.demo.amitjakhu.com/login-form/) that has a login form.

Cryptography Demystified: Protecting Your Digital Privacy (30)

You need to apply similar filters in Wireshark and enter some random credentials to test the manner of data transfer. Have a look at the data packets being sent to the website in this case.

Cryptography Demystified: Protecting Your Digital Privacy (31)

As you can see from the image above, the credentials you entered are visible to anyone monitoring your network traffic. In this case, the password was deliberately wrong, but on scam websites that ask for payment details, this can be very damaging to anyone who is either misinformed regarding HTTP websites or just missed it in general.

Cryptography Demystified: Protecting Your Digital Privacy (32)

That brings an end to the tutorial titled ‘what is cryptography’.

How Can Simplilearn Help You?

The importance of symmetric key cryptography in today’s internet sphere and its value in safeguarding our privacy and security is clear. With many bases to cover in the world of cybersecurity, cryptography is crucial, even though there are multiple more topics essential to excel in, as a cybersecurity expert.

Simplilearn offers a “Cybersecurity Expert” course designed to equip you with all the skills necessary to start or promote your career in cybersecurity. It doesn’t have any academic pre-requirements, and the introductory module will prepare beginners for the course ahead. Training for highly sought-after certifications like CompTIA Security+, CEH, CISM, and CISSP are at the forefront of this course, preparing you for the best jobs being offered in the industry.

Looking forward to a career in Cyber Security? Then check out theCertified Ethical Hacking Courseand get skilled. Enroll now!

Conclusion

Through this tutorial, you have received an understanding of why cryptography is essential, what is cryptography, its categories, and applications, all the way to its real-life implementation with a demonstration. Though not perfect, cryptography has managed to provide a secure environment for our daily information to travel through and prevent cybercrime as much as possible. To learn more on this topic, you can watch the video on what is cryptography, here: https://www.youtube.com/watch?v=rjWx39mB4Sc

Hope this tutorial on ‘What is Cryptography’ has been helpful to you. If you have any questions, please feel free to ask in the comments section, and we will be happy to answer them.

Cryptography Demystified: Protecting Your Digital Privacy (2024)
Top Articles
XDC
Is Bitcoin a good investment in 2023? Here’s what the experts say
Bashas Elearning
Plaza Nails Clifton
Ixl Elmoreco.com
Fully Enclosed IP20 Interface Modules To Ensure Safety In Industrial Environment
Doublelist Paducah Ky
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
biBERK Business Insurance Provides Essential Insights on Liquor Store Risk Management and Insurance Considerations
Hello Alice Business Credit Card Limit Hard Pull
Blue Ridge Now Mugshots Hendersonville Nc
Regular Clear vs Low Iron Glass for Shower Doors
Herbalism Guide Tbc
Craigslist Pets Sac
Non Sequitur
Used Drum Kits Ebay
Dutch Bros San Angelo Tx
Puretalkusa.com/Amac
Q Management Inc
My Homework Lesson 11 Volume Of Composite Figures Answer Key
Craigslist Maui Garage Sale
Caledonia - a simple love song to Scotland
Webcentral Cuny
Is A Daytona Faster Than A Scat Pack
Barber Gym Quantico Hours
Atdhe Net
Certain Red Dye Nyt Crossword
Mals Crazy Crab
Tuw Academic Calendar
Franklin Villafuerte Osorio
Math Minor Umn
Http://N14.Ultipro.com
Microsoftlicentiespecialist.nl - Microcenter - ICT voor het MKB
Save on Games, Flamingo, Toys Games & Novelties
Pickle Juiced 1234
D3 Boards
USB C 3HDMI Dock UCN3278 (12 in 1)
Hingham Police Scanner Wicked Local
Culvers Lyons Flavor Of The Day
Craigslist Putnam Valley Ny
Mytime Maple Grove Hospital
8776725837
30 Years Of Adonis Eng Sub
Conan Exiles Colored Crystal
Stitch And Angel Tattoo Black And White
bot .com Project by super soph
Mejores páginas para ver deportes gratis y online - VidaBytes
Att Corporate Store Location
Olay Holiday Gift Rebate.com
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 6572

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.