What is Cryptography? Definition of Cryptography, Cryptography Meaning - The Economic Times
2021.03.17 13:45

Benchmarks Nifty 14,721.30 -189.15 NSE Gainer-Large Cap Adani Power 87.20 4.1 FEATURED FUNDS ★★★ ★★ ICICI Prudential Smallcap Fund Direct Plan-Growt.. 5Y Return 16.34 % Invest Now FEATURED FUNDS ★★ ★★★ ICICI Prudential Midcap Direct Plan-Growth 5Y Return 16.67 % Invest Now FEATURED FUNDS ★★★ ★★ ICICI Prudential Large & Mid Cap Fund Direct Pla.. 5Y Return 15.15 % Invest Now FEATURED FUNDS ★★★★★ ICICI Prudential Credit Risk Fund Direct Plan-Gr.. 5Y Return 9.3 % Invest Now FEATURED FUNDS ★★★★★ ICICI Prudential Asset Allocator Fund (FOF) Dire.. 5Y Return 14.09 % Invest Now Market Watch English Edition English Edition हिंदी संस्करण | 17 March, 2021, 05:56 PM IST | E-Paper Subscribe Sign In Search + Home ETPrime Markets News Industry RISE Politics Wealth MF Tech Jobs Opinion NRI Panache ET NOW More Mediawire Newsletters Alerts E-Paper E-Learning ET Alexa Skills ET intelligence Mobile ET Android App ET iPhone App ET iPad App ET Wealth for iPad ET Blackberry App ET Nokia App ET Markets Android App ET Markets iPhone App Brand Solutions
ET India Inc. Boardroom
ET Markets Conclave – Cryptocurrency
ET CEO Roundtable
The Night of Ideas: 24 Hours Live to Feel "Closer"
The Economic Times Digital Payments Forum
The Economic Times Startup Awards 2020
Reshape Tomorrow
Tomorrow is different. Let's reshape it today
TomorrowMakers
Let's get smarter about money
Corning Gorilla Glass
#TougherTogether
ET Campus Stars
Hunt for the brightest engineers in India
Talk Your Heart Out
Mental Health Awareness Initiative
Nutrition & Immunity
The Dynamic Duo of a Holistic Self-Care
ETRise Top MSMEs
ET Prime Women Leadership Awards
Great Manager Awards
Business News › Definitions › Security › CryptographyCategories
Glossary Economy Equity Insurance Budget Marketing Mutual Fund Space Technology Testing Human Resource Finance Security Real Estate Commodity Sports Software Development Analytics Entertainment HR Transportation Astronomy Shipping Mathematics Retail EducationSuggest a new Definition
Proposed definitions will be considered for inclusion in the Economictimes.com
Security PREV DEFINITION Cross-site scriptingRead More NEXT DEFINITION Cyber Security
Read More
Definition of 'Cryptography'
Definition: Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.
Description: Earlier cryptography was effectively synonymous with encryption but nowadays cryptography is mainly based on mathematical theory and computer science practice.
Modern cryptography concerns with:
Confidentiality - Information cannot be understood by anyone
Integrity - Information cannot be altered.
Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at a later stage
Authentication - Sender and receiver can confirm each
Cryptography is used in many applications like banking transactions cards, computer passwords, and e- commerce transactions.
Three types of cryptographic techniques used in general .
1. Symmetric-key cryptography
2. Hash functions.
3. Public-key cryptography
Symmetric-key Cryptography: Both the sender and receiver share a single key. The sender uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the receiver applies the same key to decrypt the message and recover the plain text.
Public-Key Cryptography: This is the most revolutionary concept in the last 300-400 years. In Public-Key Cryptography two related keys (public and private key) are used. Public key may be freely distributed, while its paired private key, remains a secret. The public key is used for encryption and for decryption private key is used.
Hash Functions: No key is used in this algorithm. A fixed-length hash value is computed as per the plain text that makes it impossible for the contents of the plain text to be recovered. Hash functions are also used by many operating systems to encrypt passwords. PREV DEFINITION Cross-site scripting
Read More NEXT DEFINITION Cyber Security
Read More Related Definitions Secure Sockets Layer (ssl)
Secure Sockets Layer (SSL) is a protocol developed by Netscape for establishing an encrypted link between a web server and a browser. SSL is an industry standard which transmits private data securely over the Internet by encrypting it. It is used by many websites to protect the online transactions of their customers. Description: SSL functions around a cryptographic system which uses three keys t
Cross-site ScriptingCross-site scripting (XSS) is a type of computer security vulnerability. It is accounted for almost 85% of all website security vulnerabilities. Description: Cross-site scripting (XSS) exploits the 'same-origin-policy' concept of web applications to allow hackers to extract information from the system. How it works: Attackers conduct script injection that runs at the client side and is sometimes
Dns SpoofingDNS Spoofing is a type of computer attack wherein a user is forced to navigate to a fake website disguised to look like a real one, with the intention of diverting traffic or stealing credentials of the users. Spoofing attacks can go on for a long period of time without being detected and can cause serious security issues. Description: Domain Name Server (DNS) resolves the alphabetical domain nam
CiphertextCipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output of an encryption algorithm. The term "cipher" is sometimes used as an alternative term for ciphertext. Ciphertext is not understandable until it has been converted into plain text using a key. Description: Earlier cipher algorithms were performed manually and were entirely different from modern al
Computer WormA computer worm is a malicious, self-replicating software program (popularly termed as 'malware') which affects the functions of software and hardware programs. Description: It fits the description of a computer virus in many ways. For example, it can also self-replicate itself and spread across networks. That is why worms are often referred to as viruses also. But computer worms are different fr
Computer VirusA computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. Description: The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally. They are always induced by people. Once created and released, however, their diffusion is not directly under human control. After
Denial-of-service AttackDenial-Of-Service (DoS) is an attack targeted at depriving legitimate users from online services. It is done by flooding the network or server with useless and invalid authentication requests which eventually brings the whole network down, resulting in no connectivity. As a result of this, users are prevented from using a service. Description: A DoS attack is initiated by sending needless and sup
Memory CorruptionMemory corruption can be described as the vulnerability that may occur in a computer system when its memory is altered without an explicit assignment. The contents of a memory location are modified due to programming errors which enable attackers to execute an arbitrary code. Description: Memory corruption bugs mostly occur in low-level programming languages like C or C++. It is one of the proble
TrojanTrojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems. Description: Mostly Trojans are
AuthenticationAuthentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a set of identifying credentials. The credentials provided are compared to those on a file in a database of the authorized user’s information on a local operating system or within an authentication server. Description: The authentication process always runs at the start of t
Trending Definitions Debt funds Repo rate Mutual fund Gross domestic product Data mining Advertising Product Monopoly Cryptography DepreciationNot to be Missed
Safety Limited edition Nazara IPO: Should you subscribe to the issue? Why technology is the only path to sustained growth for MSMEs About 130,000 executives sign up for TCS Elevate programme Vaccine nationalism is threatening WHO’s 2021 goal of 2 billion doses, says Adar Poonawalla Digg Google Bookmarks StumbleUpon Reddit Newsvine Live Bookmarks Technorati Yahoo Bookmarks Blogmarks Del.icio.us ApnaCircleMail this Definition
My Saved Definitions
Sign in Sign up Browse Companies: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9Trending Now
Coronavirus Live news Hemant Nagarale Tamil Nadu elections Live updates Boris Johnson Suryoday SFB IPO subscription status Mutual Funds for NRIs Volkswagen Nazara IPO subscription status What is a Green card Tax slab What is an H-1b visa Sovereign gold bond Best ELSS funds Large cap funds 2021 Best mid cap funds 2021 What are debt mutual funds Aadhaar card guidePopular Categories
News Live! Markets Live ! Stock Screener MF Screener Tax-Saving Guide Candlestick Screener Sunday ET Covid Updates ET500Hot on Web
Assembly elections 2021 Live news Hemant Nagarale Covid Live updates Mutual funds SIP 2021 Sensex today IDBI bank What are multi asset funds What are balanced mutual funds Global markets Mutual funds Breaking news LTC Cash Voucher Scheme SGX Nifty Sensex Live IRCTC share price Infosys share price RupeeIn Case you missed it
Nita Ambani Gujarat night curfew Piyush Goyal Coronavirus Live updates Bengal assembly elections Live updates Aadhaar card Tax saving investments Inflation IAF MiG 21 plane crash H1b visa Tax savings guide 2021 Arbitrage funds Large & mid cap funds 2021 Best aggressive hybrid funds 2021 HDFC balanced advantage fund Mutual funds Tax CalculatorET Verticals
Auto News Retail News Health News Telecom News Energy News IT News Real Estate News Marketing & Advertising News Technology News CFO News IT Security NewsMore from our network
इकनॉमिक टाइम्स Pune Mirror Bangalore Mirror Ahmedabad Mirror ItsMyAscent Education Times Brand Capital Mumbai Mirror Times Now Indiatimes महाराष्ट्र टाइम् ವಿಜಯ ಕರ್ನಾಟಕ Go Green AdAge India Eisamay IGN India IamGujarat Times of India Samayam Tamil Samayam Telugu Miss Kyra Bombay Times Filmipop MX Player Newspaper Subscription Times Prime Colombia NBT Gold Podcast Ei Samay Gold Podcast MX ShareKaro App MX TakaTak AppOther useful Links
About Us Subscribe to ET Prime Book your Newspaper Subscription Call 1800 1200 004 (Toll Free) Create Your Own Ad Advertise with Us Terms of Use & Grievance Redressal Privacy policy Contact Us Company Name: Times Internet Limited Registered Office Address: 9-10,Bahardurshah Zafar Marg, New Delhi - 110002 Corporate Identity Number: U74999DL1999PLC135531 Grievance Officer: Deepak Ajwani Email: grievance.et@timesinternet.in RSS DNPA Code of Ethics Do not sell my infoservices
Longwalks App