cryptographic techniques

Encryption is the process by which data or information is encoded in a way that it will only be accessible to authorized personnel. Encryption ensures that data is secure from intruders who may try to have access to information which is not intended to be theirs.

cryptographic techniques
cryptographic techniques

CRYPTOGRAPHIC TECHNIQUES.

Encryption is the process by which data or information is encoded in a way that it will only be accessible to authorized personnel. Encryption ensures that data is secure from intruders who may try to have access to information which is not intended to be theirs.

READ ALSO: Customer Relationship Management System

These are techniques that are implemented with the aim of ensuring that data integrity is upheld and that data is secure and kept safe from access by unauthorized personnel. Cryptographic techniques ensure that as data flows through the medium between the source and the destination, it is not compromised or interrupted during the transportation process.

READ ALSO: Task Reminder app with Free Sourcecode

Cryptography uses the following principles to ensure that data is secure.

  1. Integrity

Which ensures that there is no alteration of data during its transmission. Data should only be altered by authorized personnel.

  1. Authentication.

This is the process by which the identity of a user is verified before one is allowed to gain access to data.

  1.  Confidentiality.

Data should only be accessed by its intended user and therefore unauthorized users should be denied access to data since it is not meant for them.

 

Cryptographic techniques mainly involve symmetric and asymmetric keys.

READ ALSO: Online Exam Android App with Admin Panel

SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHIC TECHNIQUES.

Symmetric encryption.

This type of encryption entails the use of a secret key which the sender and the receiver should be aware of to ensure the process of encryption and decryption is successful. The secret key can contain a word, number or a string of letters. Examples of symmetric encryption techniques include the following: RC4, DES, AES, RC5, RC6 and Blowfish. One of the limitations of symmetric encryption is that the sender of the data and the receiver must exchange the secret key that is used to encrypt the data and use it for decryption purpose.

Asymmetric encryption

Asymmetric encryption can also be referred to as public key cryptography. Encryption and decryption of data entails two types of keys private key and public key which are both used at separate instances. If it happens that data is encrypted using a public key, it will be decrypted using a private key. This cryptographic technique ensures that data is shared securely between receiver and recipient without any interference.

Asymmetric techniques can be classified into the following types: RSA, ECC, DSA, Diffie-Hellman and ElGamal.

READ ALSO: An E-Commerce Website with free Source Codes.

Differences between symmetric and asymmetric cryptographic techniques.

Symmetric technique was developed and has been in use for a longer period of time since it was first implemented and deployed for use while asymmetric technique was developed and implemented recently.

 Symmetric technique uses a single key for encryption and decryption of data being transmitted between a sender of information and the receiver while asymmetric technique uses two keys which are private key and public key for encryption and decryption purposes.

Symmetric technique takes a short time in conducting encryption and decryption of data since it uses a single key while asymmetric technique takes a longer period of time since it uses two separate keys for encryption and decryption purposes.

 

 

For more information about the system. You can contact me @

Email –geeksourcecodes@gmail.com
Mobile No. – +254714643906
Or feel free to comment below.

SUBSCRIBE TO OUR YOUTUBE CHANNEL BELOW TO WATCH MORE VIDEOS