Cryptography Components in Networking

Categories of Cryptography
→There are two types of Cryptography
1 Symmetric-key (Secret-key)
2 Asymmetric- key (Public-key)

1 Symmetric-key : - In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.


2 Asymmetric-key : - Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric).

↪ Comparison between two categories of cryptography





















⇾ What is Encryption : - Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. 

⇾ What is Decryption : - Decryption is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand. This term could be used to describe a method of un-encrypting the data manually or with un-encrypting the data using the proper codes or keys.

No comments:

Post a Comment