What is Cryptography? Definition, Importance, Types | Fortinet (2024)

Cryptography Definition

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

Modern cryptography techniques include algorithms and ciphers that enable theencryptionand decryption of information, such as 128-bit and 256-bit encryption keys. Modernciphers, such as the Advanced Encryption Standard (AES), are considered virtually unbreakable.

A common cryptography definition is the practice of coding information to ensure only the person that a message was written for can read and process the information. Thiscybersecuritypractice, also known as cryptology, combines various disciplines like computer science, engineering, and mathematics to create complex codes that hide the true meaning of a message.

Cryptography can be traced all the way back to ancient Egyptian hieroglyphics but remains vital to securing communication and information in transit and preventing it from being read by untrusted parties. It uses algorithms and mathematical concepts to transform messages into difficult-to-decipher codes through techniques like cryptographic keys and digital signing to protect data privacy, credit card transactions, email, and web browsing.

The Importance of Cryptography

Cryptography remains important to protecting data and users, ensuring confidentiality, and preventing cyber criminals from intercepting sensitive corporate information. Common uses and examples of cryptography include the following:

Privacy and confidentiality

Individuals and organizations use cryptography on a daily basisto protect their privacy and keep their conversations and data confidential. Cryptography ensures confidentiality by encrypting sent messages using an algorithm with a key only known to the sender and recipient. A common example of this is the messaging tool WhatsApp, which encrypts conversations between people to ensure they cannot be hacked or intercepted.

Cryptography also secures browsing, such as with virtual private networks (VPNs), which use encrypted tunnels, asymmetric encryption, and public and private shared keys.

Authentication

Integrity

Similar to how cryptography can confirm the authenticity of a message, it can also prove the integrity of the information being sent and received. Cryptography ensures information is not altered while in storage or during transit between the sender and the intended recipient. For example, digital signatures can detect forgery or tampering in software distribution and financial transactions.

Nonrepudiation

Cryptography confirms accountability and responsibility from the sender of a message, which means they cannot later deny their intentions when they created or transmitted information. Digital signatures are a good example of this, as they ensure a sender cannot claim a message, contract, or document they created to be fraudulent. Furthermore, in email nonrepudiation, email tracking makes sure the sender cannot deny sending a message and a recipient cannot deny receiving it.

Key exchange

Key exchange is the method used to share cryptographic keys between a sender and their recipient.

Global Threat Landscape Report 2H 2023 FortiGuard Labs Global Threat Landscape Report 2H 2023 shows Cybercriminals Exploiting New Industry Vulnerabilities 43% Faster than 1H 2023.

Types of Cryptographic Algorithms

There are many types of cryptographic algorithms available. They vary in complexity and security, depending on the type of communication and the sensitivity of the information being shared.

Secret Key Cryptography

Secret key cryptography, also known as symmetric encryption, uses a single key to encrypt and decrypt a message. The sender encrypts the plaintext message using the key and sends it to the recipient who then uses the same key to decrypt it and unlock the original plaintext message.

1. Stream ciphers

Stream ciphers work on a single bit or byte at any time and constantly change the key using feedback mechanisms. A self-synchronizing stream cipherensures the decryption process stays in sync with the encryption process by recognizing where it sits in the bit keystream. A synchronous stream cipher generates the keystream independently of the message stream and generates the same keystream function at both the sender and the receiver.

2. Block ciphers

Block ciphers encrypt one block of fixed-size data at a time. It will always encrypt a plaintext data block to the same ciphertext when the same key is used. A good example of this is the Feistel cipher, which uses elements of key expansion, permutation, and substitution to create vast confusion and diffusion in the cipher.

The stages of encryption and decryption are similar if not identical, which means reversing the key reduces the code size and circuitry required for implementing the cipher in a piece of software or hardware.

Public Key Cryptography

Public key cryptography (PKC), or asymmetric cryptography, uses mathematical functions to create codes that are exceptionally difficult to crack. It enables people to communicate securely over a nonsecure communications channel without the need for a secret key. For example, proxy reencryption enables a proxy entity to reencrypt data from one public key to another without requiring access to the plaintext or private keys. A common PKC type is multiplication vs. factorization, which takes two l

1. RSA

RSA was the first and remains the most common PKC implementation. The algorithm is named after its MIT mathematician developers, Ronald Rivest, Adi Shamir, and Leonard Adleman, and is used in data encryption, digital signatures, and key exchanges. It uses a large number that is the result of factoring two selected prime numbers. It is impossible for an attacker to work out the prime factors, which makes RSA especially secure.

2. Elliptic Curve Cryptography (ECC)

ECC is a PKC algorithm based on the use of elliptic curves in cryptography. It is designed for devices with limited computing power or memory to encrypt internet traffic. A common use of ECC is in embedded computers, smartphones, and cryptocurrency networks like bitcoin, which consumes around 10% of the storage space and bandwidth that RSA requires.

3. Digital Signature Algorithm (DSA)

DSA is a standard that enables digital signatures to be used in message authentication. It was introduced by the National Institute of Standards and Technology (NIST) in 1991 to ensure a better method for creating digital signatures.

4. Identity-based Encryption (IBE)

IBE is a PKC system that enables the public key to be calculated from unique information based on the user’s identity, such as their email address. A trusted third party or private key generator then uses a cryptographic algorithm to calculate a corresponding private key. This enables users to create their own private keys without worrying about distributing public keys.

5. Public Key Cryptography Standards (PKCS)

All PKC algorithms and usage are governed by a set of standards and guidelines designed by RSA Data Security. These are as follows:

  • PKCS #1 or RFC 8017: RSA Cryptography Standard
  • PKCS #3: Diffie-Hellman Key Agreement Standard
  • PKCS #5 and PKCS #5 v2.1 or RFC 8018: Password-Based Cryptography Standard
  • PKCS #6: Extended-Certificate Syntax Standard (being replaced by X.509v3)
  • PKCS #7 or RFC 2315: Cryptographic Message Syntax Standard
  • PKCS #8 or RFC 5958: Private Key Information Syntax Standard
  • PKCS #9 or RFC 2985: Selected Attribute Types
  • PKCS #10 or RFC 2986: Certification Request Syntax Standard
  • PKCS #11: Cryptographic Token Interface Standard
  • PKCS #12 or RFC 7292: Personal Information Exchange Syntax Standard
  • PKCS #13: Elliptic Curve Cryptography Standard
  • PKCS #14: Pseudorandom Number Generation Standard
  • PKCS #15: Cryptographic Token Information Format Standard

6. Diffie-Hellman and Key Exchange Algorithm (KEA)

The Diffie-Hellman algorithm was devised in 1976 byStanford University professor Martin Hellman and his graduate student Whitfield Diffie, who are considered to be responsible for introducing PKC as a concept. It is used for secret key exchanges and requires two people to agree on a large prime number.

KEA is a variation of the Diffie-Hellman algorithm and was proposed as a method for key exchange in the NIST/National Security Agency’s (NSA) Capstone project, which developed cryptography standards for public and government use.

Click to See Larger Image

Hash Function

Hash functions ensure that data integrity is maintained in the encryption and decryption phases of cryptography. It is also used in databases so that items can be retrieved more quickly.

Hashing is the process of taking a key and mapping it to a specific value, which is the hash or hash value. A hash function transforms a key or digital signature, then the hash value and signature are sent to the receiver, who uses the hash function to generate the hash value and compare it with the one they received in the message.

A common hash function is folding, which takes a value and divides it into several parts, adds parts, and uses the last four remaining digits as the key or hashed value. Another is digit rearrangement, which takes specific digits in the original value, reverses them, and uses the remaining number as the hash value. Examples of hash function types include Secure Hash Algorithm 1 (SHA-1), SHA-2, and SHA-3.

Types of Cryptographic Key Attacks and Risks

What are cryptographic key attacks? Modern cryptographic key techniques are increasingly advanced and often even considered unbreakable. However, as more entities rely on cryptography to protect communications and data, it is vital to keep keys secure. One compromised key could result in regulatory action, fines and punishments, reputational damage, and the loss of customers and investors.Potential key-based issues and attack types that could occur include:

1. Weak keys

Keys are essentially random numbers that become more difficult to crack the longer the number is. Key strength and length need to be relative to the value of the data it protects and the length of time that data needs to be protected. Keys should be created with a high-quality, certified random number generator that collects entropy—the information density of a file in bits or characters—from suitable hardware noise sources.

2. Incorrect use of keys

When keys are used improperly or encoded poorly, it becomes easier for a hacker to crack what should have been a highly secure key.

3. Reuse of keys

Every key should only be generated for a specific single-use encrypt/decrypt purpose, and use beyond that may not offer the level of protection required.

4. Non-rotation of keys

Keys that are overused, such as encrypting too much data on a key, become vulnerable to attacks. This is particularly the case with older ciphers and could result in data being exposed. Keys need to be rotated, renewed, and updated when appropriate.

5. Inappropriate storage of keys

Storing keys alongside the information they have been created to protect increases their chances of being compromised. For example, keys stored on a database or server that gets breached could also be compromised when the data is exfiltrated.

6. Inadequate protection of keys

Huge cyberattacks like Meltdown/Spectre and Heartbleed have been capable of exposing cryptographic keys stored in server memory. Therefore, stored keys must be encrypted and only made available unencrypted when placed within secure, tamper-protected environments, or even kept offline.

7. Insecure movement of keys

Moving keys between systems should only occur when the key is encrypted or wrapped under an asymmetric or symmetric pre-shared transport key. If this is not possible, then the key must be split up into multiple parts that are kept separate, re-entered into the target system, then destroyed.

8. Insider threats (user authentication, dual control, and segregation of roles)

Insider threats are one of the most serious threats posed to any key. This is most likely to occur through a rogue employee having access to a key, then using it for malicious purposes or giving or selling it to a hacker or third party.

9. Lack of resilience

Resilience is vital to protecting the availability, confidentiality, and integrity of keys. Any key that suffers a fault with no backup results in the data the key protects being lost or inaccessible.

10. Lack of audit logging

Key life cycles must be logged and recorded in full to ensure any compromise can be tracked and enable subsequent investigations to occur smoothly.

11. Manual key management processes

Recording key management processes manually on paper or spreadsheets runs the risk of human error and makes the keys highly vulnerable to attack or theft.

How to Minimize the Risks Associated with Cryptography

Organizations and individuals can minimize and mitigate cryptography-related threats with a dedicated electronic key management system from a reputable provider. The solution must use a hardware security module to generate and protect keys, and underpin the entire system’s security.

It needs to include features like full key management life cycle, strong key generation, strict policy-based controls, swift compromise detection, secure key destruction, strong user authentication, secure workflow management, and a secure audit and usage log. This will protect the organization's keys, enhance efficiency, and ensure compliance with data and privacy regulations.

Another potential solution is cryptography quantum, whereby it is impossible to copy data encoded in a quantum state.

Cryptography FAQs

1. What do you mean by cryptography?

In computer science, cryptography is the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages.

3. What are the three types of cryptography?

The three types of cryptography are:

  1. Secret key cryptography
  2. Public key cryptography
  3. Hash function cryptography

3. What is an example of cryptography

The Rivest-Shamir-Adleman (RSA) algorithm is widely used on the Internet. RSA uses a pair of keys to encrypt and decrypt information.

What is Cryptography? Definition, Importance, Types | Fortinet (2024)

FAQs

What is Cryptography? Definition, Importance, Types | Fortinet? ›

Cryptography ensures confidentiality by encrypting sent messages using an algorithm with a key only known to the sender and recipient. A common example of this is the messaging tool WhatsApp, which encrypts conversations between people to ensure they cannot be hacked or intercepted.

What is cryptography and its importance? ›

Cryptography Definition. Cryptography is the technique of obfuscating or coding data, ensuring that only the person who is meant to see the information–and has the key to break the code–can read it. The word is a hybrid of two Greek words: “kryptós”, which means hidden, and “graphein”, which means to write.

What are the main types of cryptography? ›

The most commonly used techniques in cryptography, are,
  • Symmetric Key Cryptography,
  • Asymmetric Key Cryptography,
  • Hashing,
  • Secret Sharing,
  • Digital Signatures,
  • Elliptic Curve Cryptography,
  • Quantum Cryptography,
  • Steganography,
Jul 2, 2024

What are the four functions of cryptography? ›

Cryptography focuses on four different objectives:
  • Confidentiality. Confidentiality ensures that only the intended recipient can decrypt the message and read its contents.
  • Non-repudiation. ...
  • Integrity. ...
  • Authenticity.

What are the five functions of cryptography? ›

There are five primary functions of cryptography:
  • Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
  • Authentication: The process of proving one's identity.
  • Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
Aug 18, 2024

Why is key important in cryptography? ›

In cryptography, a key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

How is cryptography used in everyday life? ›

'Cryptography in everyday life' contains a range of situations where the use of cryptography facilitates the provision of a secure service: cash withdrawal from an ATM, Pay TV, email and file storage using Pretty Good Privacy (PGP) freeware, secure web browsing, and use of a GSM mobile phone.

What are the three main concepts of cryptography? ›

Although hybrid systems do exist (such as the SSL internet protocols), most encryption techniques fall into one of three main categories: symmetric cryptography algorithms, asymmetric cryptography algorithms or hash functions.

What is an example of cryptography? ›

Cryptography ensures confidentiality by encrypting sent messages using an algorithm with a key only known to the sender and recipient. A common example of this is the messaging tool WhatsApp, which encrypts conversations between people to ensure they cannot be hacked or intercepted.

What is the strongest type of cryptography? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

What are the three main goals of cryptography? ›

The Objectives of Cryptography

Cryptography has four major goals: confidentiality, integrity, authentication, and non-repudiation. Put another way, the goals are data privacy (confidential treatment), data authenticity (verified source), and data integrity (original and unaltered message).

What are the 4 principles of cryptography? ›

The four principles of cryptography are confidentiality, integrity, authentication, and non-repudiation.

What are 4 key cryptography pillars? ›

Core concepts related to information security (data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography.

What is the basic understanding of cryptography? ›

Cryptography is a technique of securing information and communications through the use of codes so that only those persons for whom the information is intended can understand and process it. Thus preventing unauthorized access to information.

What is the main use of cryptography? ›

Cryptography is used to keep messages and data secure from being accessible to anyone other than the sender and the intended recipient. It is the study of communications and a form of security for messaging. Ultimately, cryptography can keep data from being altered or stolen. It can also be used to authenticate users.

What is the essential purpose of cryptography? ›

Cryptography can ensure the confidentiality and integrity of both data in transit as well as data at rest. It can also authenticate senders and recipients to one another and protect against repudiation. Software systems often have multiple endpoints, typically multiple clients, and one or more back-end servers.

How is cryptography used in the world today? ›

In today's digital landscape, cryptography plays a vital role in our daily lives, ensuring that sensitive data like credit card numbers, e-commerce transactions and even WhatsApp messages remain confidential and secure.

What is the important principle of cryptography? ›

Cryptographic principles are the fundamental concepts and techniques that are used in the field of cryptography to secure communication and protect data. These principles include confidentiality, integrity, authentication, non-repudiation, and key management.

Why is cryptography important in the government? ›

In modern times, cryptography is used extensively by governments and other organizations to protect their sensitive data from being accessed by unauthorized people.

Top Articles
Google Workspace will NOT be Free anymore; here are top 5 alternatives
Microworker - Definition, History and Microwork Sites
DPhil Research - List of thesis titles
Ups Dropoff Location Near Me
Maria Dolores Franziska Kolowrat Krakowská
Uihc Family Medicine
Craigslist Mexico Cancun
B67 Bus Time
A Fashion Lover's Guide To Copenhagen
Walgreens On Nacogdoches And O'connor
Craigslist Greenville Craigslist
Detroit Lions 50 50
Sport Clip Hours
Scholarships | New Mexico State University
Oc Craiglsit
What Happened To Maxwell Laughlin
The Murdoch succession drama kicks off this week. Here's everything you need to know
Nutrislice Menus
Craigslist Free Stuff Greensboro Nc
Overton Funeral Home Waterloo Iowa
20 Different Cat Sounds and What They Mean
Sussur Bloom locations and uses in Baldur's Gate 3
67-72 Chevy Truck Parts Craigslist
Terry Bradshaw | Biography, Stats, & Facts
Zillow Group Stock Price | ZG Stock Quote, News, and History | Markets Insider
Slim Thug’s Wealth and Wellness: A Journey Beyond Music
Wkow Weather Radar
Sofia the baddie dog
Harrison County Wv Arrests This Week
Yale College Confidential 2027
Black Lion Backpack And Glider Voucher
Blush Bootcamp Olathe
Citibank Branch Locations In Orlando Florida
Moonrise Time Tonight Near Me
Shiftwizard Login Johnston
Litter-Robot 3 Pinch Contact & DFI Kit
Closest 24 Hour Walmart
The Boogeyman Showtimes Near Surf Cinemas
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
WorldAccount | Data Protection
Thelemagick Library - The New Comment to Liber AL vel Legis
Noaa Duluth Mn
Sams Gas Price Sanford Fl
Mathews Vertix Mod Chart
Coffee County Tag Office Douglas Ga
John Wick: Kapitel 4 (2023)
Phmc.myloancare.com
Espn Top 300 Non Ppr
Craiglist.nj
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Uncle Pete's Wheeling Wv Menu
Latest Posts
Article information

Author: Laurine Ryan

Last Updated:

Views: 5759

Rating: 4.7 / 5 (57 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Laurine Ryan

Birthday: 1994-12-23

Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

Phone: +2366831109631

Job: Sales Producer

Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.