Nowadays, we are using the internet for everything. For
instance, we are using the internet to connect with friends and family, online
banking, shopping, and transferring information. In other words, we are giving
away our valuable information on the internet. And, as I mentioned earlier in
blog post “Hacking:
Prevention or Theft?”, hackers can easily hack most of the information we are
giving away on the internet. However, we can use cryptography techniques to
secure our information on the internet. So, today I would like to inform you
all about cryptography.
Encryption and Decryption techniques |
What is
Cryptography?
Cryptography is the study of securely transforming
information, so a third party cannot have any access to secured information.
Cryptography uses two main concepts called encryption and decryption to
securely transfer or store information. Encryption basically transforms stored
information to some unreadable text using probability and number theory. On the
other hand, decryption decodes the encrypted formula to convert unreadable text
to original text. So, now with cryptography technique if hackers were to get
access to transferred or stored information, then they will not be able to use
that information because it will be transformed into very unreadable text.
Caesar's Cipher Cryptography Technique |
Caesar’s Cipher
Now that I have introduced you about the cryptography, let me
give you one simple example to give you more insight about the technique of
cryptography. One of the simplest examples in cryptography is known as Caesar’s Cipher.
Julius Caesar was the first one to use cryptography technique. In Caesar’s
Cipher, encryption can shift all the letters by 3 characters. That means that
ABC will become DEF. Similarly, decryption will be simple because it simply
un-shifts the characters to the original text. So, when we read the encrypted text,
it will not make sense, but with a simple decryption method we will be able to
retrieve the original information back.
I hope you learned something interesting about cryptography by reading this post. I am looking forward to hear your opinion about this post, so please leave a comment.
References: