Cryptography is a technique by which we can safely send our data from one place to another or we can say from sender to receiver computer. Or we can say it is an art of writing the data into secret codes so that it cannot be understand by any other third party or intruder.

As we can send data from one computer to another computer without using cryptography technique it will be easily hack by any another third party any miss use it and it may also possible to change the data to any other form which would be a wrong information to receiver user. As shown in below figure (1).


In the above figure sender want to send information to receiver of pay $ 100 which is original information when it is goes from sender to receiver it is hacked by intruder and intruder transform it to pay $ 200 and send it to the receiver and receiver will received a wrong piece of information which would be harmful for receiver.

But if we use cryptography techniques we use encryption method to transform the data into encrypted form before send to receiver so if it is hacked by any intruder it cannot be understand by it and he will not be able to transform it. As shown in figure (2).



As show in above figure when a sender send a particular data to receiver before send it encrypted in another format which cannot be understand by any third a party or we can say intruder . so at the receiver end it first decrypt the data and the get a original data.

Generally it is based on mathematical algorithms and these algorithms used a secret key for secure transactions.

Cryptography conditions

In Cryptography each person receives a pair of keys, called the public-key, or private-key. Through encryption and decryption will be done with the help of public key and private key both the receiver end and sender end. Each user public key is published but private key kept secret which is only known to user. Any user can send the information or any data using public key encryption but can only decrypted it with private key. The original data known as plane text and after encryption known as cipher text.

Classical Cryptography techniques

Classical cipher’s compromise two basic components:

  • Substitution ciphers.
  • Transposition ciphers.
    • Mon alphabetic.
    • Poly alphabetic.

Several of these ciphers are group together to form a product ciphers.










Like it on Facebook, Tweet it or share this article on other bookmarking websites.

Comments (0)

There are no comments posted here yet

What is the main gadget on our body in present days?

main gadget
No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 4 answer(s).
[{"id":"21976","title":"Ipad","votes":"8","type":"x","order":"1","pct":8.99,"resources":[]},{"id":"21977","title":"Laptop","votes":"15","type":"x","order":"2","pct":16.85,"resources":[]},{"id":"21978","title":"Mobile","votes":"61","type":"x","order":"3","pct":68.54,"resources":[]},{"id":"21979","title":"Desktop","votes":"5","type":"x","order":"4","pct":5.62,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
bottom 200
No married couple wants to end up getting divorced. It is not like they have planned for it. They try to put up with their partners for as long as they
Due to our modern lifestyle, we feel that digestion related disorders are a common problem. Thus, we neither give importance to them nor seek any help
The bond of marriage brings the two people together. Initially, everything may seem okay and both of them slowly start discovering each other in the journey.
Internet A Growing Need of our Nation, Internet is best option to learn, enjoy, and even earn from it. Internet help students in their studies, a mother
Introduction:  The very word, “cyber crime” has several distinctive connotations for system administrators who deal with a sense of sophistication
Ethical hacking and its opportunities Ethical hacking means hacking a system or a website for to understand the security weakness in order to make the
How to stay secure? We hangout with laptops and smart phones on a daily basis. Every right implies a responsibility. Every opportunity is a possession
How is cyber crime actually defined?: A notorious hacker is seating in somewhere at the outskirts of Russia or China with a laptop in his couch. He is