Cryptography
Network security is archived by the cryptography. This is
the science based on the abstract algebra. In this article, we will discuss the
short terms and also discuss the security of the data that is transferred in a
network.
Introduction
First, we will the definition of the cryptography.
Cryptography
Cryptography is a word of Greek origin means “secret writing”.
However, we use this term in the science and art for the transform of the
message to make them secure and immune to attack.
In the below pic I’ll show you the cryptography components
Plain-text
and Cipher-text
The original message, before being transformed, is called a
plain text. After the message is transformed this is called cipher text. An
encryption algorithm is transformed the plain text to the cipher text. A decryption
algorithm is used for decipher the message for the recipient.
Cipher
We refer to encryption and decryption
algorithms as ciphers. The term cipher is also used to the different categories
of the algorithms in cryptography. This is not to say that every sender and the
receiver needs their very unique cipher for a secure communication. On the other
side one cipher can serve on millions of communication pairs.
Two categories
we can divide the cipher
algorithm in to two groups: symmetric key (also called secret Key) cryptography
algorithms and the other is Asymmetric (also called public Key) cryptography
algorithms.
Symmetric-key cryptography
In symmetric-key cryptography
the same key is used for the both parties. In sender side sender use the and
the encryption algorithm to encipher the data: on the other side the receiver
use the same key and the decryption algorithm to decryption the data.
Asymmetric-Key
cryptography
In asymmetric cryptography there are two keys used: first one is the public key and the second is the private key. Public key is announced for the public and the private key is only for the receiver. When the message is just about be send the sender use the public key and encryption the data on the other side receiver use the private key and decryption the data.
Comparison
Let us compare symmetric-key
and asymmetric –key cryptography.Encryption can be thought of as electronic
locking; decryption as electronic unlocking. The sender puts the message in a
box and locks the box by using a key; the receiver unlocks the box with a key and takes out the
message. The difference lies in the mechanism of the locking and unlocking and
the type of keys used.
In symmetric-Key cryptography,
the same key locks and unlocks the box. In asymmetric-key cryptography , one key
locks the box, the another is needed to unlock the box.
The security is necessary in
the every work of life. Because we all want privacy with our matters. We don’t
want that some one interrupt in our work or personal matters. And also computer network
is our own privacy that’s why we want that our data keeps safe and secure
without any pugs, harm and attacked.



No comments:
Post a Comment