<br />
<b>Warning</b>:  Undefined array key "global_protection_id" in <b>/home/wikitechy/public_html/interview-questions/wp-content/plugins/content-protector/inc/class-ps-rest-handler.php</b> on line <b>51</b><br />
{"id":3872,"date":"2022-01-29T10:23:29","date_gmt":"2022-01-29T10:23:29","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=3872"},"modified":"2022-03-23T12:36:54","modified_gmt":"2022-03-23T12:36:54","slug":"what-is-cryptography","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/","title":{"rendered":"What is Cryptography ?"},"content":{"rendered":"<ul>\n<li>Cryptography is the study of securing communications from outside observers.<\/li>\n<li>Encryption algorithms\u00a0take the original message, or\u00a0plaintext, and converts it into ciphertext, which is not understandable.<\/li>\n<li>The key allows the user to\u00a0decrypt\u00a0the message, thus ensuring on they can read the message.<\/li>\n<li>The strength of the randomness of an\u00a0encryption\u00a0is also studied, which makes it harder for anyone to guess the key or input of the algorithm.<\/li>\n<li>Cryptography is how we can achieve more secure and robust connections to elevate our privacy.<\/li>\n<li>Advancements in cryptography makes it harder to break encryptions so that encrypted files, folders, or network connections are only accessible to authorized users.<\/li>\n<\/ul>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-3986 size-full\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg\" alt=\"\" width=\"623\" height=\"223\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg 623w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography-300x107.jpg 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography-390x140.jpg 390w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><\/p>\n<h4 id=\"objectives-of-cryptography\">Objectives of Cryptography:<\/h4>\n<ul>\n<li>Confidentiality: Confidentiality guarantees that only the supposed recipient can decrypt the message and study its contents.<\/li>\n<li>Non-repudiation: Non-repudiation means the sender of the message cannot back down in the future and deny their reasons for sending or creating the message.<\/li>\n<li>Integrity: Integrity focuses on the ability to be sure that the data contained in the message can\u2019t be changed at the same time as in storage or transit.<\/li>\n<li>Authenticity: Authenticity ensures the sender and recipient can confirm every other\u2019s identities and the destination of the message.<\/li>\n<\/ul>\n<h4 id=\"types-of-cryptography\">Types of Cryptography<\/h4>\n<ul>\n<li>Secret Key Cryptography<\/li>\n<li>Public Key Cryptography<\/li>\n<li>Hash Functions<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"alignnone wp-image-3985 size-full\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/types-of-cryptography.jpg\" alt=\"\" width=\"892\" height=\"446\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/types-of-cryptography.jpg 892w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/types-of-cryptography-300x150.jpg 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/types-of-cryptography-768x384.jpg 768w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/types-of-cryptography-390x195.jpg 390w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/types-of-cryptography-820x410.jpg 820w\" sizes=\"(max-width: 892px) 100vw, 892px\" \/><\/p>\n<p><strong>Secret Key Cryptography<\/strong><\/p>\n<ul>\n<li>Secret Key Cryptography, or symmetric cryptography, makes use of a single key to encrypt information.<\/li>\n<li>Both encryption and decryption in symmetric cryptography use the identical key, making this the perfect form of cryptography.<\/li>\n<li>The cryptographic algorithm makes use of the key in a cipher to encrypt the information, and when the data have to be accessed again, someone entrusted with the secret key can decrypt the data.<\/li>\n<li>Secret Key Cryptography may be used on each in-transit and at-rest data, but is generally only used on at-rest data, as sending the secret to the recipient of the message can lead to compromise.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-3984 size-full\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/symmetric-encryption.jpg\" alt=\"\" width=\"644\" height=\"542\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/symmetric-encryption.jpg 644w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/symmetric-encryption-300x252.jpg 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/symmetric-encryption-390x328.jpg 390w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/p>\n<p><strong>Public Key Cryptography<\/strong><\/p>\n<ul>\n<li>Public Key Cryptography, or asymmetric cryptography, makes use of keys to encrypt data.<\/li>\n<li>It is used for encryption, while the alternative key can decrypts the message. Unlike symmetric cryptography, if one key is used to encrypt, that identical key can&#8217;t decrypt the message, rather the alternative key will be<\/li>\n<li>One key is saved private, and is known as the \u201cprivate key\u201d, while the alternative is shared publicly and may be used by anyone, hence it is called the \u201cpublic key\u201d.<\/li>\n<li>The mathematical relation of the keys is such that the private key can&#8217;t be derived from the public key, but the public key may be derived from the private.<\/li>\n<li>The private key should not be allotted and must remain with the owner The public key may be given to some other entity.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3987 size-full\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/assymmetric-encryption.jpg\" alt=\"\" width=\"753\" height=\"611\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/assymmetric-encryption.jpg 753w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/assymmetric-encryption-300x243.jpg 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/assymmetric-encryption-390x316.jpg 390w\" sizes=\"(max-width: 753px) 100vw, 753px\" \/><\/p>\n<p><strong>Hash Functions<\/strong><\/p>\n<ul>\n<li>Hash functions are irreversible which secure the data, on the price of not being capable of recover the original<\/li>\n<li>Hashing is a way to convert a given string into a fixed length<\/li>\n<li>A good hashing algorithm will produce unique outputs for every input<\/li>\n<li>The simplest way to crack a hash is through attempting each input possible, untill you get the exact same hash.<\/li>\n<li>A hash may be used for hashing data (which includes passwords) and in certificates.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3983 size-full\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/hash-function.jpg\" alt=\"\" width=\"542\" height=\"379\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/hash-function.jpg 542w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/hash-function-300x210.jpg 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/hash-function-390x273.jpg 390w\" sizes=\"(max-width: 542px) 100vw, 542px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography is the study of securing communications from outside observers. Encryption algorithms\u00a0take the original message, or\u00a0plaintext, and converts it into ciphertext, which is not understandable. The key allows the user to\u00a0decrypt\u00a0the message, thus ensuring on they can read the message. The strength of the randomness of an\u00a0encryption\u00a0is also studied, which makes it harder for anyone [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"passster_activate_protection":false,"passster_protect_child_pages":"","passster_protection_type":"password","passster_password":"","passster_activate_overwrite_defaults":"","passster_headline":"","passster_instruction":"","passster_placeholder":"","passster_button":"","passster_id":"","passster_activate_misc_settings":"","passster_redirect_url":"","passster_hide":"no","passster_area_shortcode":"","gtb_hide_title":false,"gtb_wrap_title":false,"gtb_class_title":"","gtb_remove_headerfooter":false,"footnotes":""},"categories":[16540],"tags":[16696,16705,16703,16702,16699,16695,16697,16700,16701,16698,16704],"class_list":["post-3872","post","type-post","status-publish","format-standard","hentry","category-cyber-security","tag-cryptography-and-its-types","tag-cryptography-example","tag-cryptography-examples","tag-cryptography-tutorial","tag-types-of-cryptography","tag-what-is-cryptography","tag-what-is-cryptography-and-how-does-it-work","tag-what-is-cryptography-in-blockchain","tag-what-is-cryptography-in-computer-network","tag-what-is-cryptography-in-security","tag-what-is-cryptography-with-example"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cryptography ? - Cryptography and its Types - Wikitechy<\/title>\n<meta name=\"description\" content=\"What is Cryptography ? - Cryptography is the study of securing communications from outside observers.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cryptography ? - Cryptography and its Types - Wikitechy\" \/>\n<meta property=\"og:description\" content=\"What is Cryptography ? - Cryptography is the study of securing communications from outside observers.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-29T10:23:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-23T12:36:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/\",\"name\":\"What is Cryptography ? - Cryptography and its Types - Wikitechy\",\"isPartOf\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg\",\"datePublished\":\"2022-01-29T10:23:29+00:00\",\"dateModified\":\"2022-03-23T12:36:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4\"},\"description\":\"What is Cryptography ? - Cryptography is the study of securing communications from outside observers.\u00a0\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/#primaryimage\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg\",\"contentUrl\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg\",\"width\":623,\"height\":223},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/www.wikitechy.com\/interview-questions\"],\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cryptography ? - Cryptography and its Types - Wikitechy","description":"What is Cryptography ? - Cryptography is the study of securing communications from outside observers.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"What is Cryptography ? - Cryptography and its Types - Wikitechy","og_description":"What is Cryptography ? - Cryptography is the study of securing communications from outside observers.\u00a0","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/","og_site_name":"Wikitechy","article_published_time":"2022-01-29T10:23:29+00:00","article_modified_time":"2022-03-23T12:36:54+00:00","og_image":[{"url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/","name":"What is Cryptography ? - Cryptography and its Types - Wikitechy","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg","datePublished":"2022-01-29T10:23:29+00:00","dateModified":"2022-03-23T12:36:54+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4"},"description":"What is Cryptography ? - Cryptography is the study of securing communications from outside observers.\u00a0","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/cyber-security\/what-is-cryptography\/#primaryimage","url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg","contentUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/01\/what-is-cryptography.jpg","width":623,"height":223},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/www.wikitechy.com\/interview-questions"],"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/3872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=3872"}],"version-history":[{"count":3,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/3872\/revisions"}],"predecessor-version":[{"id":3988,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/3872\/revisions\/3988"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=3872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=3872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=3872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}