Halaman

    Social Items


Cryptography definition their algorithm types and keys
 definition

Cryptography is a method which is used to convert a plain text into ciphertext, if you do not know what is Plane text and cipher text then we explain it in the short form in the below of the article.

The cryptography is used over the large in the networking because when we send file and data from one place to another place with the help of the internet then fear in our mind to lose this data so to overcome this difficulty cryptography has used this method to convert our important data into the machine language.

So after the converting, this code is not readable and no any third party can miss using this data when we convert plain text into cipher the text then this code is called encrypted code and when we convert this encrypted code into plain text then this process is called decryption.

Plain Text


It is the normal text or sentence which are used to communicate with the people this text is readable, this text may be our local language and with the help of the text, we can write letters, applications, etc.
Ex- English, Hindi, German, French, and other languages.

Cipher Text


In the cryptography ciphertext is one of the most important part, this is the coded text which is not read this text is made by with the help of powerful computers this ciphertext is decoded by only authorizing people.

Types of ciphertext


There are two types of ciphertext
(a) Transposition cipher
(b) Substation cipher

(a) Transposition cipher


Under the transposition cipher, the whole text is first of all analyzed by the computers and then it converts into ciphertext but in the transposition ciphertext the position of the text or characters are replaces by the computers and all information about this conversion is save on the file this file is called is key and only this key is able to decode the ciphertext.

If we have no key of the given ciphertext then we cannot convert this ciphertext into plain text so to save our data after converting into ciphertext, we save this program key on the authorize place

Substitution cipher.


If we replace the plane text with another word, letters, character or by a mixture of words then this type of ciphertext is called substitution cipher this ciphertext looks like as transposition but it is not same because in the transpose cipher the character will be the same and there the position will be change but in the substitution cipher the text is replaced by another text so all the format of the plane text will be totally changed.

After the substation cipher, the given code is decrypted (decode) by only those method which is used to encrypt it, the decryption of code is doing with the help of keys, the information of these keys is taken secret because if these keys are going to another third party then they steal our data when we send it.

Properties of Cryptography


There are many properties of cryptography which are discussed below
(1) After the encryption of plain text, it is not user friendly so its method is to secure our data.
(2) This method is provided confidentially (Not access by the third party) of our data.
(3) After the encryption of data, it will decode by only authorize people

Some main facts about cryptography


If we send data to the receiver directly then fear in our the mind always being that if this data is hacked by any person then our important information will be leak and this data may be miss-used by the hacker so most of the networking system, cryptography is used.

After the encryption of data the security of data is increase and if some cases any other person steals this encrypted data then it is not able to decode it because for the decode of this data a key is required which has only authorize people so this method keeps our data safe.

There are many algorithms that are used for the encryption of data this algorithm changes according to the time so this is another main feature of the cryptography because this algorithm is not same always so it pervaded our network security.

Process for encryption of the plain text


First of all plain text converted into numerical form and when it converts into numerical there are many rules that are applied to convert it the all conversion is saved on keys after the converting into ciphertext this data is sent to the receiver when receiver access this cipher code they convert this code into a plane and use their work.




Cryptography definition their algorithm types and keys


Cryptography definition their algorithm types and keys
 definition

Cryptography is a method which is used to convert a plain text into ciphertext, if you do not know what is Plane text and cipher text then we explain it in the short form in the below of the article.

The cryptography is used over the large in the networking because when we send file and data from one place to another place with the help of the internet then fear in our mind to lose this data so to overcome this difficulty cryptography has used this method to convert our important data into the machine language.

So after the converting, this code is not readable and no any third party can miss using this data when we convert plain text into cipher the text then this code is called encrypted code and when we convert this encrypted code into plain text then this process is called decryption.

Plain Text


It is the normal text or sentence which are used to communicate with the people this text is readable, this text may be our local language and with the help of the text, we can write letters, applications, etc.
Ex- English, Hindi, German, French, and other languages.

Cipher Text


In the cryptography ciphertext is one of the most important part, this is the coded text which is not read this text is made by with the help of powerful computers this ciphertext is decoded by only authorizing people.

Types of ciphertext


There are two types of ciphertext
(a) Transposition cipher
(b) Substation cipher

(a) Transposition cipher


Under the transposition cipher, the whole text is first of all analyzed by the computers and then it converts into ciphertext but in the transposition ciphertext the position of the text or characters are replaces by the computers and all information about this conversion is save on the file this file is called is key and only this key is able to decode the ciphertext.

If we have no key of the given ciphertext then we cannot convert this ciphertext into plain text so to save our data after converting into ciphertext, we save this program key on the authorize place

Substitution cipher.


If we replace the plane text with another word, letters, character or by a mixture of words then this type of ciphertext is called substitution cipher this ciphertext looks like as transposition but it is not same because in the transpose cipher the character will be the same and there the position will be change but in the substitution cipher the text is replaced by another text so all the format of the plane text will be totally changed.

After the substation cipher, the given code is decrypted (decode) by only those method which is used to encrypt it, the decryption of code is doing with the help of keys, the information of these keys is taken secret because if these keys are going to another third party then they steal our data when we send it.

Properties of Cryptography


There are many properties of cryptography which are discussed below
(1) After the encryption of plain text, it is not user friendly so its method is to secure our data.
(2) This method is provided confidentially (Not access by the third party) of our data.
(3) After the encryption of data, it will decode by only authorize people

Some main facts about cryptography


If we send data to the receiver directly then fear in our the mind always being that if this data is hacked by any person then our important information will be leak and this data may be miss-used by the hacker so most of the networking system, cryptography is used.

After the encryption of data the security of data is increase and if some cases any other person steals this encrypted data then it is not able to decode it because for the decode of this data a key is required which has only authorize people so this method keeps our data safe.

There are many algorithms that are used for the encryption of data this algorithm changes according to the time so this is another main feature of the cryptography because this algorithm is not same always so it pervaded our network security.

Process for encryption of the plain text


First of all plain text converted into numerical form and when it converts into numerical there are many rules that are applied to convert it the all conversion is saved on keys after the converting into ciphertext this data is sent to the receiver when receiver access this cipher code they convert this code into a plane and use their work.




No comments

Please do not spamming comment