CRYPTOGRAPHY :Cryptography in layman’s terms would mean the study of creating messages in a form of secret code that masks the actual message and displays it as something completely unintelligible.These cryptic messages make absolutely no sense to the casual observer, but the original content can be reconstructed by the intended recipient. That’s what cryptography is about—it uses complex mathematical calculations and computer science to pull off the job.

ENCRYPTION: Encryption is simply the implementation of cryptography. It is the process by which messages are converted into encrypted files. These files are password-protected by the creator author.Without the password, the file cannot be accessed and the original contents cannot be extracted. On entering the password correctly, the computer decrypts the file,revealing the actual message or data. Prior to encryption, data is simply referred to as ‘plaintext’ but once encrypted, it is called ‘ciphertext’, which means jumbled or puzzled data.

CIPHER: In simple terms, a cipher is a code or a set of instructions. More accurately put, it’s an algorithm that contains precise instructions for encrypting and decrypting data. In the world of encryption, there are two main types of ciphers; the transposition cipher and the substitution cipher. The two work in completely different ways. The former rearranges characters in a file, making them look illogical e.g. the word ‘COMPUTER’ might look like ‘UEORCPTM’ after encryption.The second method completely changes the content to corresponding values, and then reconstitutes it upon decryption, e.g. The word ‘COMPUTER’ might look like ‘YGBLWDJI’. In this example, the letters in both words correspond to each other sequentially starting from the first (A=W,B=X, C=Y, etc).

ALGORITHM: In the field of mathematics, an algorithm is a predefined set of precise instructions for a task to be accomplished successfully, from the initial stage right to the output. For instance, when you try switching on your computer and it doesn’t come on, you check the connections. If connections aren’t ok, you fix them and if they are, you look for a fault somewhere else, ruling out different possibilities at each step. It is an ‘if-then’ principle.

KEYSTREAM: A keystream is a collection or a stream of alphanumeric and special characters combined with the actual message. These characters are either randomly placed or appear to be random in nature.

BRUTE FORCE ATTACK: A brute force attack is an intensive trial-and-error procedure by which a person can try to crack the key or password of a file by trying different combinations of alphanumeric or special characters until the perfect match is found.


Like it on Facebook, Tweet it or share this article on other bookmarking websites.

No comments