|
Cryptography Property Name | Details |
Confidentiality | Information cannot be understood by anyone while in transmission. |
Integrity | Information cannot be Modified. |
Non-repudiation | Sender cannot deny his/her intentions in the transmission of the information at a later stage |
Authentication | Sender and receiver can confirm each other |
Types of cryptographic techniques
Cryptograpy Type | Details |
Symmetric-key Cryptography | Both the sender and receiver share a single key. |
Public-key cryptography | Here two related keys (public and private key) are used. Public key is freely distributed used for encryption and private /secret key used for decryption. |
Hash functions. | No keys are used in this algorithm but it uses Hash functions to calculate a hash value based on plain text and its length and is used to recover plain text. |
Cryptography applications:
Banking transactions, computer passwords, Ecommerce transactions e.t.c.
Home Back