{"id":7683,"date":"2020-04-27T17:44:36","date_gmt":"2020-04-27T12:14:36","guid":{"rendered":"https:\/\/triumphias.com\/blog\/?p=7683"},"modified":"2025-08-01T10:43:25","modified_gmt":"2025-08-01T05:13:25","slug":"cryptography-its-uses","status":"publish","type":"post","link":"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/","title":{"rendered":"Cryptography &#038; its Uses"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >What's Inside this Blog!<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#Cryptography_its_Uses\" title=\"Cryptography &amp; its Uses\">Cryptography &amp; its Uses<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#Introduction\" title=\"Introduction:\">Introduction:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#About\" title=\"About:\">About:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#Classical_Cryptography\" title=\"Classical Cryptography:\">Classical Cryptography:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#Modern_Cryptography\" title=\"Modern Cryptography:\">Modern Cryptography:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#Symmetric_Key_algorithms\" title=\"Symmetric Key algorithms:\">Symmetric Key algorithms:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#Asymmetric_Key_algorithms\" title=\"Asymmetric Key algorithms:\">Asymmetric Key algorithms:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/triumphias.com\/blog\/cryptography-its-uses\/#Cryptographic_Research_in_India\" title=\"Cryptographic Research in India:\">Cryptographic Research in India:<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Cryptography_its_Uses\"><\/span>Cryptography &amp; its Uses<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><span style=\"color: #0000ff;\"><strong>Relevance: Prelims\/Mains: G.S paper III: Science and technology:\u00a0Science and Technology- developments and their applications and effects in everyday life \u2022 Achievements of Indians in science &amp; technology; indigenization of technology and developing new technology. \u2022 Awareness in the fields of IT, Space, Computers, robotics, nano-technology, bio-technology.<\/strong><\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/image1.slideserve.com\/2390327\/what-is-cryptography-l.jpg\" alt=\"PPT - Cryptography PowerPoint Presentation, free download - ID:2390327\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Introduction\"><\/span><span style=\"text-decoration: underline; color: #ff0000;\"><em><strong>Introduction:<\/strong><\/em><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Secured concern for diplomats, military, and other officials over the ages. Even if it\u2019s exact origin cannot be traced back communication has always been an area of precisely, its importance can surely be understood from the fact that even the greatest rulers like Julius Ceasar had such a method for information exchange popularly named after him as Caesar Cipher.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"About\"><\/span><span style=\"text-decoration: underline; color: #ff0000;\"><em><strong>About:<\/strong><\/em><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>The process of securing information by manipulating it in such a way that makes it incomprehensible for people unaware of the secret is called cryptography. Cryptography is a combination of two Greek words, cryptos meaning secret, and graphein meaning writing. So, in other words, cryptography can also be called secret writing.<br \/>\n\u2022 The technique is mainly based on a set of steps to be followed sequentially to achieve the incomprehensibility. These steps together constitute an algorithm. The algorithm takes meaningful information known as plaintext and converts it into a gibberish data called ciphertext.<br \/>\n\u2022 Mostly this conversion might require an additional piece of secret information known as a key whose knowledge is essential for securing and revealing the information. This process is known as encryption and decryption respectively.<br \/>\n\u2022 Depending upon the period, cryptography can be broadly categorized as Classical cryptography and Modern Cryptography.<\/li>\n<li><img decoding=\"async\" src=\"https:\/\/bekimdauti.files.wordpress.com\/2017\/03\/cryptography-2.jpg\" alt=\"Short) History of Cryptography | Bekim Dauti's Blog\" \/><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Classical_Cryptography\"><\/span><span style=\"text-decoration: underline; color: #ff0000;\"><em><strong>Classical Cryptography:<\/strong><\/em><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Classical cryptography refers to the early form of the methodology which was mostly dependent on the rearrangement and the substitution of the letters in a way that the output could not be understood without the prior knowledge of the process.<br \/>\n\u2022 These forms of cryptography were very popular in ancient Egypt and Greece. The popular Caesar cipher is one of the oldest examples of the substitution cipher in which the letters of the plaintext were replaced by the letters in the alphabets starting from any specific place in the sequence.<\/li>\n<\/ul>\n<p>Example: Let us assume that we replace each letter in a given plaintext with a new letter obtained by moving three places from the current letter in the English alphabet to obtain the ciphertext.<br \/>\nPlaintext: we are safe.<br \/>\nCiphertext: zh duh vdih.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Modern_Cryptography\"><\/span><span style=\"text-decoration: underline; color: #ff0000;\"><em><strong>Modern Cryptography:<\/strong><\/em><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Modern cryptography is primarily based on mathematical calculations that are easy enough to be carried out by a computer using a key but hard enough to be guessed in the absence of the same key. Claude E. Shannon is considered to be the father of this mathematical form of cryptography that led to the origin of the modern ciphers.<br \/>\n\u2022 Current cryptosystems work on the Kerckhoff\u2019s principle which emphasizes on exposing everything related to the cipher in the public domain (including the algorithm) except for the<br \/>\nkey. This means that the actual security of the data relies on the strength of the key used for encryption. Hence, for a modern cipher that is free from any design flaws, the length of the key used (in bits) will give an idea about the number of possible keys to be tried to break the security.<br \/>\nFor example, if the key length used by an algorithm is 8 bits then there would be 28 i.e. 256 possible key combinations that need to be tried to reveal the information using brute-force.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Symmetric_Key_algorithms\"><\/span><span style=\"text-decoration: underline; color: #ff0000;\"><em><strong>Symmetric Key algorithms:<\/strong><\/em><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>These are algorithms that use the same key for the encryption and the decryption process and hence require the key being shared among all the individuals who need to have access to the data. Since the secrecy completely depends on the key being used, any accidental disclosure of the same to non-authorized individuals might lead to compromise of the entire system.<br \/>\n\u2022 This problem of safe key exchange is the greatest challenge associated with this method making it suitable only for securing data for an individual or a small group of people when this approach is not associated with any other special protocol for information exchange.<br \/>\n\u2022 Example: DES, AES-128, AES-256, Blowfish, IDEA, Twofish, etc.<\/li>\n<li><img decoding=\"async\" src=\"https:\/\/static.blockgeeks.com\/wp-content\/uploads\/2019\/05\/symmetricalkey-cryptography.jpg\" alt=\"Learn All About Cryptocurrencies Cryptography because it Works!\" \/><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Asymmetric_Key_algorithms\"><\/span><span style=\"color: #ff0000;\"><strong>Asymmetric Key algorithms:<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>These are algorithms that use a pair of keys for the encryption and decryption of the data \u2013 the keys are known as the public key and private key, respectively. The private key is kept a secret with the owner and is used to decrypt the data encrypted with the public key made available to everyone in the public domain. Another use of this type of algorithm is for user authentication where the data encrypted with the private key can be decrypted with the public key to verify the fact that only the owner of the private key can encrypt the data.<br \/>\n\u2022 Since this type of algorithm doesn\u2019t rely on a single key for security, it overcomes the limitation of the symmetric key algorithms and is used for information exchange on the internet as a part of various information exchange protocols. One of the major limitations of these algorithms as compared to symmetric algorithms is that they are computationally expensive hence using them frequently within a process is not easy.<\/li>\n<li><img decoding=\"async\" src=\"https:\/\/www.edureka.co\/blog\/wp-content\/uploads\/2018\/07\/sending-message-over-network-what-is-cryptography-edureka-1.png\" alt=\"What is Cryptography? | Cryptographic Algorithms | Types of ...\" \/><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Cryptographic_Research_in_India\"><\/span><em><span style=\"text-decoration: underline;\"><span style=\"color: #ff0000;\"><strong>Cryptographic Research in India:<\/strong><\/span><\/span><\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Cryptography along with information security being one of the hottest topics in the current times has made a huge impact within the Indian research fraternity as well. India with the motive of gaining excellence and promoting knowledge in this domain has set up some of the world\u2019s best institutes like RC Bose Centre for Cryptology and Security at Kolkata.<br \/>\n\u2022 Organisations like Cryptology Research Society of India (CRSI) and Scientific Analysis Group (SAG) of the Defence Research &amp; Development Organisation (DRDO) also do a lot of research in this field. The popular international cryptography conference called Indocrypt has been organized by CRSI every year since 2000 for the promotion of cryptography in India and abroad.<br \/>\n\u2022 Specialisation courses in cryptography and its associated fields are also offered at various IITs like IIT Kharagpur and IIT Madras for youngsters seeking a career in this domain.<br \/>\n\u2022 There is a need for official guidelines from the government on the standardization of the algorithms and cipher suites to be used to safeguard the personal data collected by the government and private entities from individuals to ensure a minimum level of standardized data security within the country. And of course, spreading awareness of the subject among the people is very essential to remain happy, healthy, and safe in cyberspace.<\/li>\n<\/ul>\n<p><span style=\"color: #0000ff;\"><strong>For more such notes, Articles, News &amp; Views Join our Telegram Channel.<\/strong><\/span><\/p>\n<p><a title=\"Telegram Link\" href=\"https:\/\/t.me\/triumphias\" target=\"_blank\"><span style=\"color: #ff0000;\"><strong>https:\/\/t.me\/triumphias<\/strong><\/span><\/a><\/p>\n<p><span style=\"color: #0000ff;\"><strong>Click the link below to see the details about the UPSC \u2013Civils courses offered by Triumph IAS.<\/strong> <\/span><span style=\"color: #ff0000;\"><strong><a style=\"color: #ff0000;\" title=\"Courses available\" href=\"https:\/\/triumphias.com\/pages-all-courses.php\">https:\/\/triumphias.com\/pages-all-courses.php<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography &amp; its Uses Relevance: Prelims\/Mains: G.S paper III: Science and technology:\u00a0Science and Technology- developments and their applications and effects<\/p>\n","protected":false},"author":1,"featured_media":7335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[123,42,69],"tags":[392],"class_list":["post-7683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","category-general-studies-iii-technology-economic-development-bio-diversity-environment-security-and-disaster-management","category-science-and-technology","tag-union-public-service-commission-upsc"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/7683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/comments?post=7683"}],"version-history":[{"count":2,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/7683\/revisions"}],"predecessor-version":[{"id":32009,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/7683\/revisions\/32009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media\/7335"}],"wp:attachment":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media?parent=7683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/categories?post=7683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/tags?post=7683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}