support@cybershakha.com
Gujarat,India
+91 70466 47894
Your trusted ally in the digital realm.
support@cybershakha.com
Gujarat,India
+91 70466 47894
Cryptography is a method of encryption and decryption in which we encrypt our messages to keep it secure and those messages get decrypted with the
Cryptography is a method of encryption and decryption in which we encrypt our messages to keep it secure and those messages get decrypted with the unique key only.
In the earlier times cryptography was used to pass messages in war.
Secret messages were passed in war with the use of cryptography to restrict the enemies from reading the message.
There are lots of type of cryptography techniques or algorithms. They are:
1. Hybrid encryption
Hybrid encryption combines public-key cryptography with symmetric encryption for data encryption. This cryptographic type generates a private key and encrypts it using the public key.
2. Asymmetric cryptography
This type of cryptography, known as "public-key cryptography," uses different cryptographic keys for the encryption and decryption processes.
3. Symmetric cryptography
Symmetric-key cryptography involves encrypting and decrypting using the same cryptographic keys. Here, the sender and all receivers share a common secret key. The plaintext messages are transformed into cipher text using a particular encryption key. The receiver can use the same encryption key to decrypt the message using the shared secret key.
4. AES
The Advanced Encryption Standard (AES) is a symmetric encryption algorithm used by many governments worldwide. It was established by the National Institute of Standards and Technology (NIST) in the U.S.
5. RSA
The RSA (Rivest-Shamir-Adleman) algorithm is an asymmetric encryption algorithm invented by Ron Rivest, Adi Shamir and Leonard Adleman in 1978. It is used to encrypt data and communications over the internet and for email encryption.
6. Caesar cipher
This is one of the earliest and most simple encryption techniques there is. It is commonly known as a substitution cipher.
7. Hill cipher
Symmetric key ciphers are implemented as either block ciphers or stream ciphers.
8. Monoalphabetic cipher
The plans of Rather Homographic Encryption (SWHE) carry out a restricted cipher text operation.
9. Secret key cryptography
Also known as a secret-key algorithm, a symmetric-key algorithm transforms data to make it extremely difficult to view without possessing a secret key.
And many more