Cyber Security | Cryptography Algorithms Types


Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Symmetric algorithms allow encryption and decryption with the same key.

Features Cryptography:-


Information can only be accessed by the person for whom it is intended and no other person except him can access it.

Image for post


Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct.

Image for post

Digital Signatures Verification:-

Digital signature technology allows the recipient of given signed message to verify its real origin and its integrity.
The process of digital signature verification is purposed to ascertain if a given message has been signed by the private key that corresponds to a given public key

Image for post


Non-repudiation is the assurance that someone cannot deny the validity of something.

Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data.

Image for post


Authentication is the process of recognizing a user’s identity.

It is the mechanism of associating an incoming request with a set of identifying credentials.

Identification phase provides a user identity to the security system.

This identity is provided in the form of a user ID.

Image for post

Types of Cryptography

Symmetric Key Cryptography:

It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages.

Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner.

The most popular symmetric key cryptography system is Data Encryption System(DES).

Image for post

2.Hash Functions:

There is no usage of any key in this algorithm.

A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered.

Many operating systems use hash functions to encrypt passwords.

Image for post

3.Asymmetric Key Cryptography:

Under this system a pair of keys is used to encrypt and decrypt information.

A public key is used for encryption and a private key is used for decryption.

Public key and Private Key are different.

Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.

Image for post

Leave a Reply

error: Content is protected !!