Cryptography involves creating written or generated codes that allows information to be kept secret. Cryptography converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without anyone decoding it back into a readable format, thus compromising the data.
Information security uses cryptography on several levels. The information cannot be read without a key to decrypt it. The information maintains its integrity during transit and while being stored. Cryptography also aids in non-repudiation. This means that neither the creator nor the receiver of the information may claim they did not create or receive it.
Cryptography is also known as cryptology.
Information security uses cryptography on several levels. The information cannot be read without a key to decrypt it. The information maintains its integrity during transit and while being stored. Cryptography also aids in non-repudiation. This means that neither the creator nor the receiver of the information may claim they did not create or receive it.
Cryptography is also known as cryptology.
What Is Encryption?
Encryption is the conversion of electronic data into another form, called cipher-text, which cannot be easily understood by anyone except authorized parties.The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also the following key elements of security:
Authentication: the origin of a message can be verified.
Integrity: proof that the contents of a message have not been changed since it was sent.
Non-repudiation: the sender of a message cannot deny sending the message.
There are two types of encryption
1)Symmetric Cryptography
2)Asymmetric Cryptography
1)Symmetric Cryptography
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plain-text and decryption of cipher-text.
2)Asymmetric Cryptography
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.
Here I used symmetric encryption.
Using the "Browse" button , we can add a file which we want to encrypt.
Once we click the "Encrypt" button ,the file will encrypt.
Then the whole data of the file will encrypted.
Using "Decrypt" button we can derypt the file.
Once we click the "Encrypt" button ,the file will encrypt.
Then the whole data of the file will encrypted.
You can download my source files from this link :-https://github.com/thusith94/Encryption
No comments:
Post a Comment