Cryptography

Cryptography

Cryptography is the technique which allow the internet to be more safer place.It allow to kept the information exchange between the sender and the receiver to kept secret . By convert the sended information to the particular code is it not possible to read without having it encoding method.

Example

Let understand with an example there are two persons let say P1 and P2 where p1 is act as a sender and p2 is act as a receiver who are exchanging there information via internet medium like email,what app etc. As we know the information which is send from p1 to p2 send in the form of packets. let suppose for a second the packed or the message which are sen by P1 is not encrypted(mean the packer contain readable information which can be easily read by anyone) if the third person get that packed which is send by the P1 and able to see and change that information which is send by p1. Then there will be huge lost of data security and it can be take very harmful result and uncontrollable effects if the information send by the p1 is bank detail his money can be stealed and if there is important information related to the his work or any think else can be taken away without his information which lead to very danger suction you better know what i mean.
To get protected from this suction the messages/ information which is send from on person to another person is first convert into an unreadable form (before converting it to the packets) which can only get encode through the specific key which is only given to the reciter.


whole blog short "Cryptography is the technique to secure the data from third party"

There are several method for method/ways for doing Cryptography some most popular are:-
  1. symmetric-key cryptography
  2. hash function
  3. public-key cryptography

1.Symmetric-key cryptography

In this method both the sander and receiver share a single key.The sender use this to encrypt plaintext and receiver use it to decode the message.

2.Hash function 

In this method no key is required .A  fixed length hash value is computed as per the plain text which make impossible for the content of the plain text text to recovered it.


3.Public-key cryptography

This is the most used method in the my project. in it there are two related keys (public  and private key) are used. The public key is freely distributed, while it's paired private key, remain secret. The public key is used for encryption and decryption of private key.
you must try it by yourself on this link -
(highly recommenced) https://rojkmao.com/cu7WWiO

you can easily get this all by the following digram

 

 


  1. Click this link and help this website to grow
  2.  https://rojkmao.com/iX8tvNm

related blog:- 

  1. make money online 

    blockchain

    docker 

    more blog soon on:-

    1. cloud computing
    2. darkweb

    More categrious:-