Cryptography

Cryptography

Cryptography


The large scale upsurge in exchange of information, electronic data or in other words, the escalation in digital communication, almost all of us communicate through cyberspace without being worried about secure exchange of information. Through cyberspace we communicate our private information on large scale. Thus it can be affirmed that the exchange of our private or confidential information through cyberspace is vulnerable to attack by cybercriminals allowing them to manipulate or even exploit our data without our consent. This necessitates the need to be aware and enable secure transmission of data using certain effective technique.

Information security can be thus defined as a term that describes or includes strategies, procedures etc for disabling stealing of information, illegal access to private data of an individual etc. However, ensuring the privacy and secure transmission of data in conjugation with reliable transmission it is necessary that the existing techniques are optimized and also some novel techniques are introduced that can potentially detect such threats and facilitate secure transmission of data (Riman & Abi-Char, 2015).

Considering such an urgent need for the secure transmission of data it was observed that since the ancient days of the Romans encoding has been serving as one of the most suitable strategies for maintaining the privacy of the information transmitted. Encoding actually refers to alteration or conversion of data into some form of symbols by making use of meaningless codes. While encoding is used during the transmission of data for enabling data security decoding, the opposite process of encoding is used to convert the data to its original state.

This process of encoding and decoding is completely based on a single key which is also known as identical key cryptography. During the process of encoding and decoding a single key is employed and a secure medium is required for transmission and reception of data for computing the secret key.
In order to enable secure transmission of data in cyberspace, it is necessary that data encryption and decryption is processed with higher efficacy. These processes enable conversion of data into an unreadable format in order to secure it and allow it to be accessed by authorized users only.

This encryption and decryption of data are together termed as cryptography. Cryptography is a technique used to protect the information that is transmitted through computers, electronic devices etc. (Koç, 2009). It enables secure and safe communication of private and critical data. Cryptography allows users to exchange information through different mediums without being vulnerable to cyber attacks (Bachman, Brown, & Norton, 2010).

It allows users and organizations to transmit and receive hidden messages into codes, numbers, symbols etc so as to enable secure transmission of data (Martin, 2016). Thus to summarize it can be asserted that the only objective of cryptography is to secure data, mails, other sophisticated information such as credit card and debit card details that are transmitted through a public network (Delfs & Knebl, 2007). Predominantly, there are two techniques used to convert information or encrypt it (Paar & Pelzl, 2010). They are symmetric and asymmetric cryptography (Gencoglu, 2019).

Cryptography is primarily categorized into three main types (Goffe & Sosin, 2005; McCabe, Trevino, & Butterfield, 2001; Muneer & Basha, 2009; Rogers, 2006):

Secret key Cryptography: In this cryptography, only one convert digital key is used and the same key is employed to encrypt as well as decrypt data. It applies that the same key is used by the sender as well as receiver to encrypt the data or convert into symbols etc and then decrypt the data for converting it into its original form (Muneer & Basha, 2009).

Public key Cryptography: Contrary to the secret key technique, this cryptography technique uses a pair of digital keys which facilitates higher security. In this technique, both the transmitting and receiving parties have a pair of keys, one public and one private key. While the public key is commonly shared between both the users, the other key is kept as private (Karls, 2009). While transmitting data, the sender employs pubic key for encrypting data and once the encrypted data is received, the receiver uses his secret key for decrypting the data.

Hash Functions: In this category of cryptography, there is not needed any digital key. Instead, it uses a hash value of fixed length which is encrypted into the plain text (Gençoğlu, 2019).
Some of the key objectives of employing cryptography for transmission of data are given as follows:

References:


Bachman, D. J., Brown, E. A., & Norton, A. H. (2010). Chocolate Key Cryptography. Mathematics Teacher, 104(2). Retrieved from https://www.nctm.org/Publications/mathematics-teacher/2010/Vol104/Issue2/Chocolate-Key-Cryptography/

Ben-Daya, M., Hassini, E., & Bahroun, Z. (2019). Internet of things and supply chain management: a literature review. International Journal of Production Research, 57(15-16), 4719–4742. https://doi.org/10.1080/00207543.2017.1402140

Delfs, H., & Knebl, H. (2007). Introduction to Cryptography. https://doi.org/10.1007/3-540-49244-5

Gencoglu, M. T. (2019). Embedded image coding using laplace transform for Turkish letters. Multimedia Tools and Applications, 78(13), 17521–17534. https://doi.org/10.1007/s11042-018-7096-9

Gençoğlu, M. T. (2019). Importance of Cryptography in Information Security. IOSR Journal of Computer Engineering (IOSR-JCE), 21(1), 65–68. https://doi.org/10.9790/0661-2101026568

Goffe, W. L., & Sosin, K. (2005). Teaching with Technology: May You Live in Interesting Times. The Journal of Economic Education, 36(3), 278–291. https://doi.org/10.3200/JECE.36.3.278-291

Koç, Ç. K. (2009). Cryptographic Engineering (Ç. K. Koç, ed.). https://doi.org/10.1007/978-0-387-71817-0

Martin, K. . (2016). Everyday Cryptography: Fundamental Principles and Applications. Retrieved from https://www.amazon.in/Everyday-Cryptography-Fundamental-Principles-Applications/dp/0198800703

Paar, C., & Pelzl, J. (2010). Understanding Cryptography. https://doi.org/10.1007/978-3-642-04101-3

Karls, M. A. (2009). Codes, Ciphers, and Cryptography—An Honors Colloquium. PRIMUS, 20(1), 21–38. https://doi.org/10.1080/10511970802348073

Muneer, S. A., & Basha, G. M. (2009). Enhanced security for online exams using group cryptography. IEEE Transactions on Education, 52(3), 340–349. https://doi.org/10.1109/TE.2008.928909

Riman, C., & Abi-Char, P. E. (2015). Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey. Information Security and Computer Fraud, 3(1), 1–7. https://doi.org/10.12691/iscf-3-1-1

McCabe, D. L., Trevino, L. K., & Butterfield, K. D. (2001). Cheating in Academic Institutions: A Decade of Research. Ethics & Behavior, 11(3), 219–232. https://doi.org/10.1207/S15327019EB1103_2

Checklist


Is this article helpful?