About the Cryptography category

Encryption/decryption, public/private keys, hash functions, zero-knowledge, database encryption, etc.

Really glad to join the forum. I’m passionate about cybersecurity and enthusiastic to research cryptography in blockchain.

4 Likes

@Cindy, welcome to the forum! What kind of cryptography work are you doing? There’s an interesting feed about IoT and blockchain cryptography here that you might be interested in: Offline Data Verification of Blockchain for IoT Devices. You’re also most welcome to come say hello to us in our Chat.

1 Like

Cryptography concerns

Attackers can bypass cryptography, hack into computers that are responsible for data encryption and decryption, and exploit weak implementations, such as the use of default keys. However, cryptography makes it harder for attackers to access messages and data protected by encryption algorithms.

  • four objectives mordern crytography concern itself with

• Confidentiality. The information cannot be understood by anyone for whom it was unintended.

• Integrity. The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.

• Non-repudiation. The creator/sender of the information cannot deny at a later stage their intentions in the creation or transmission of the information.

• Authentication. The sender and receiver can confirm each other’s identity and the origin/destination of the information.

Types of cryptography

  • Single-key or symmetric-key encryption algorithms create a fixed length of bits known as a block cipher with a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decipher it. One example of symmetric-key cryptography is the Advanced Encryption Standard to protect sensitive information. The standard is mandated by the U.S. government and widely used in the private sector.

  • Public-key or asymmetric-key
    encryption algorithms use a pair of keys, a public key associated with the creator/sender for encrypting messages and a private key that only the originator knows (unless it is exposed or they decide to share it) for decrypting that information.