Saturday, June 20, 2020

What is Encryption and Decryption.

Hello Friends, This is Anand Kumar and in this blog we would learn about Encryption ,Decryption and types of encryption.


Encryption
: Encryption is a process where a message ,data or file is encoded in such type were only certain people can access data. In simple words if you have a pre-shared key you can read the encrypted message or data.


What Is Homomorphic Encryption? And Why Is It So Transformative?

for example In What's app Encryption only the sender and receiver can see the message not even What's app could read the message.  

Decryption:Decryption is a process where a encrypted message or file is decoded in to the normal state or the initial state(Plain Text)


Some of the common terms used in cyber security field,

Plain Text:  Plain text is a term refers to a message before encryption or after decryption.

Cipher Text: Cipher text is a term refers to a message after Encryption. Encrypted data is called as Cipher text.


Decryption definition and information



Types of Encryption:

There are two types of encryption ,they are Symmetric encryption and Asymmetric encryption .


Major difference between these encryption types is whether or not the same key is used for encryption and decryption.


Symmetric Encryption:

Symmetric encryption is a type of encryption where only one key (a shared secret key) is used to both encrypt and decrypt electronic information.
Here both Alice Bob uses the same shared secret key.

Pre-shared key: Pre-shared key is a key which is used in symmetric encryption were both the sender and the receiver (Alice & Bob)uses same key for both encryption and the decryption.

What is Symmetric Key Cryptography? | Security Wiki


Asymmetric Encryption: 

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt. the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it.

In Asymmetric Encryption two keys are used one key is used for encryption and another key is used for decryption.

Public key: Public key is used for encrypt the plain text to convert it into cipher text 

Private key:private key is a key that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric-key encryption and used to decrypt and transform a message to a readable format 

Public-key cryptography - Wikipedia

Source of images used in this blog is Google Images.
THANK YOU SO MUCH READERS FOR READING,SEE YOU IN NEXT BLOG!

1 comment:

  1. Nice one, very well written.Good one, keep up the good work! Keep going man!! The pictures were really helpful. I wanna see you bringing in more such stuff & rock it!

    Regards,
    Dilip Suthar

    ReplyDelete

Ransomware

In this article, we will be learning about Ransomware and best practises to get rid of it! Ransomware is a type of malware attack which is c...

What is Bug Bounty with real time example