We are building EduLadder(ELADR) - Protocol

The Eladr Protocol is a decentralized, security and efficiency enhanced Web3 noSQL database powered by IPFS as the data storage layer https://ipfs.io/, and the Cardano block chain as the rewards token platform, https://cardano.org/. It provides a JSON based, IPFS layer 2 solution for data indexing and retrieval in an 'append only' file system built with open source Node.js API libraries.

The ELADR token was designed to incentivize and reward community members as a proof of contribution. Token holders are also granted access to EduLadder.com premium features as well as associated ELADR token enabled apps.

WHITE PAPER Buy Now Try BETA

Real Problems! Real Experts!

Join Our Telegram Channel !


The Eduladder is a community of students, teachers, and programmers. We help you to solve your academic and programming questions fast.
In eduladder you can Ask,Answer,Listen,Earn and Download Questions and Question papers.
Watch related videos of your favorite subject.
Connect with students from different parts of the world.
Apply or Post Jobs, Courses ,Internships and Volunteering opportunity. For FREE
See Our team
Wondering how we keep quality?
Got unsolved questions? Ask Questions


You are here:Open notes-->CSSCryptography-->Cryptography

Cryptography

How to study this subject


Add contents here

Official Notes


Add contents here

Notes from other sources


Cryptography and its Types

Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”.

In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions.

Techniques used For Cryptography:
In today’s age of computers cryptography is often associated with the process where an ordinary plain text is converted to cipher text which is the text made such that intended receiver of the text can only decode it and hence this process is known as encryption. The process of conversion of cipher text to plain text this is known as decryption.

Features Of Cryptography are as follows:

  1. Confidentiality:
    Information can only be accessed by the person for whom it is intended and no other person except him can access it.
  2. Integrity:
    Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected.
  3. Non-repudiation:
    The creator/sender of information cannot deny his or her intention to send information at later stage.
  4. Authentication:
    The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed.

Types Of Cryptography:
In general there are three types Of cryptography:

Symmetric Key Cryptography:It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is Data Encryption System(DES).

Hash Functions:There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.

Asymmetric Key Cryptography:Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.

Playfair Cipher with Examples

Hill Cipher

Vigenère Cipher

Caesar Cipher in Cryptography

Substitution Cipher

Keyword Cipher

Difference between Monoalphabetic Cipher and Polyalphabetic Cipher

Difference between Block Cipher and Stream Cipher

Block Cipher modes of Operation

Data encryption standard (DES) | Set 1

Difference between AES and DES ciphers

RSA Algorithm in Cryptography

Implementation of Diffie-Hellman Algorithm

Model question papers


Add contents here

Previous year question papers


Add contents here

Useful links


Add contents here

Editors




play