Page 51 - CITS - Computer Software Application -TT
P. 51

COMPUTER SOFTWARE APPLICATION - CITS




           he primary application of cryptography in electronic data transmission is the encryption and decryption of emails
           and other plaintext messages. The most straightforward technique is the “secret key” or symmetric approach.
           In this method, a secret key is employed to encrypt the data, and upon decryption, the secret key and the encoded
           message are shared with the recipient. However, a significant problem arises from this process. If intercepted, a
           third party could use the shared key to decipher and analyze the message.
           To address this issue, cryptographers developed the asymmetric or “public key” approach. In this scheme, each
           user possesses two keys: a private key and a public key. Before sending a message, the sender obtains the
           recipient’s public key and uses it to encrypt the message. Since only the recipient has access to their corresponding
           private key, they can decrypt the message.
           This asymmetric approach resolves the security vulnerability of the secret key approach, ensuring that even if the
           communication is intercepted, only the intended recipient possessing the private key can decipher the message.
           Plain Text: Plain text is the original, unencrypted message or data that you want to protect or transmit securely.
           It’s the human-readable  form of the information that you can easily understand. For example, if you have a
           message like “Hello, this is a secret message,” that would be the plain text.
           Ciphertext: Ciphertext refers to the transformed and encrypted form of data that has undergone encryption using
           cryptographic techniques. It is the result of applying an encryption algorithm to plaintext (original, readable data)
           in order to secure it during transmission or storage. Ciphertext appears as a seemingly random and unreadable
           sequence of characters, making it unintelligible without the appropriate decryption key or algorithm. The primary
           purpose of ciphertext is to protect sensitive information from unauthorized access, ensuring its confidentiality and
           integrity.

           For instance, let’s employ the Caesar Cipher to encrypt a sentence. With a key of 7, the letter ‘a’ shifts to ‘h’.
           Original Sentence: This is a plaintext.
           Encrypted Sentence(Ciphertext): Aopz pz h wshpualea.
           Purpose of cryptography

           •  The purpose of cryptography is to secure communication and data by converting information into a format that
              is unintelligible to unauthorized individuals.
           •  This  safeguards  sensitive  information  during  transmission  and  storage,  preventing  unauthorized  access,
              eavesdropping, and tampering.
           •  Cryptography also enables the verification of data authenticity and the authentication of users or entities in
              digital transactions.

           •  Overall, cryptography plays a vital role in ensuring privacy, data integrity, and secure interactions in various
              digital environments.
           Cryptographic algorithms
           Cryptographic algorithms, also referred to as ciphers, are essential components of cryptosystems that ensure
           secure communication between computer systems, devices, and applications.
           A cipher suite encompasses various algorithms: one for encryption, another for message authentication, and
           yet another for key exchange. These processes are integrated into protocols and implemented through software
           operating on operating systems and interconnected computer networks. This involves:

           -  Generating public and private keys for encrypting and decrypting data.
           -   Performing digital signatures and verification for authenticating messages.
           -   Executing key exchange mechanisms to establish secure communication channels.
           Types of Cryptography
           Symmetric key
           Symmetric key cryptography involves a method where both the sender and recipient utilize a common shared key
           for both encrypting and decrypting messages.





                                                           38

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   46   47   48   49   50   51   52   53   54   55   56