Monday, February 23, 2026

UNIT 2 MJ–15 (Th):- INFORMATION SECURITY (UNIT NAME):- CRYPTOGRAPHY AND ENCRYPTION

 




DR. AJAY KUMAR PATHAK 

ASSISTANT PROFESSOR

READ  ALL THE NOTES CHAPTER WISE   

SUBJECT NAME:- MJ–15 (Th):- INFORMATION SECURITY 

 FOR B. Sc. IT. 

 SEM 6 F.Y.U.G.P. 

UNIT 2  :-  CRYPTOGRAPHY AND ENCRYPTION 

LEARN NOTES FROM HERE
PREPARED BY DR. AJAY KUMAR PATHAK 
                                ©Copyrights 
MJ–15 (Th):-
CRYPTOGRAPHY AND ENCRYPTION   

Copyright © by Dr. Ajay kumar pathak

B. Sc. IT. SEMESTER 6 NOTES BASED ON NEP

SUBJECT : MJ–15 (Th): INTRODUCTION TO NETWORK SECURITY  

(To be selected by the students from)

Course Learning and Outcomes:- Know about the logics and algorithms needed for computer programming

UNIT 2 (UNIT NAME):-  CRYPTOGRAPHY AND ENCRYPTION

Objective: The objective of the course is to enable students to 

·   The objective of this course is to provide students with a comprehensive understanding of network security concepts and techniques. The course aims to develop students' skills in identifying network vulnerabilities, implementing security measures, and ensuring the confidentiality, integrity, and availability of networked systems. 

Learning Outcome:- After completion of this course, a student will be able to–

·         Understand the principles and concepts of network security.

·         Identify potential security threats and vulnerabilities in networked systems.

·         Implement security measures to protect network infrastructure.

·         Apply encryption and authentication techniques to secure network communication.

·         Analyze and respond to security incidents in networked environments







-:        NOTES READ FROM HERE           :-

 

UNIT- 2    :- CRYPTOGRAPHY AND ENCRYPTION

 

INTRODUCTION TO CRYPTOGRAPHY AND ENCRYPTION:-


INTRODUCTION TO ENCRYPTION:- Data that can be read and understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish (nonsense) called ciphertext. You use encryption to make sure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting ciphertext to its original plaintext is called decryption.


OR

 

Encryption is the process of converting readable plain text data into ciphertext and an unreadable format using an algorithm and an encryption key, while decryption means the reverse process; only the owner of the decryption key corresponding to it can reverse the Encryption and return the ciphertext into its plaintext. This means that Encryption helps protect sensitive data from unauthorized access, which is a crucial aspect of maintaining good Cyber Hygiene. There are other encryption algorithms besides symmetric Encryption, whereby a single key is used for Encryption and decryption. Asymmetric encryption works by having one pair of keys that enables Encryption using the public key and decryption results using the private key, all aiding in providing security on data at the transmission interface.

 

OR

A process that transforms information (the plaintext) into a seemingly unintelligible form (the ciphertext) using a mathematical algorithm and some secret information (the encryption key). The process of decryption undoes this transformation using a mathematical algorithm, in conjunction with some secret value (the decryption key) that reverses the effects of the encryption algorithm. An encryption algorithm and all its possible keys, plaintexts and ciphertexts is known as a cryptosystem or cryptographic system.

                            Figure 4 illustrates the process.




Cryptography is the general name given to the art and science of keeping messages secret. It is not the purpose here to examine in detail any of the mathematical algorithms that are used in the cryptographic process, but instead to provide a general overview of the process and its uses.

Modern encryption systems use mathematical algorithms that are well known and have been exposed to public testing, relying for security on the keys used. For example, a well-known and very simple algorithm is the Caesar cipher, which encrypts each letter of the alphabet by shifting it forward three places. Thus A becomes D, B becomes E, C becomes F and so on. (A cipher that uses an alphabetic shift for any number of places is also commonly referred to as a Caesar cipher, although this isn't strictly correct since the Caesar cipher is technically one in which each character is replaced by one three places to the right.) I could describe this mathematically as p + 3 = c, where p is the plaintext and c the ciphertext. For a more general equation I could write p + x = c where x could take any integer value up to 25. Selecting different values for x would obviously produce different values for c, although the basic algorithm of a forward shift is unchanged. Thus, in this example the value x is the key. (The Caesar cipher is of course too simple to be used for practical security systems.)

There are two main requirements for cryptography:-

(1)      It should be computationally infeasible to derive the PLAINTEXT FROM THE CIPHERTEXT without knowledge of the decryption key.

(2)      It should be computationally infeasible to derive the CIPHERTEXT FROM THE PLAINTEXT without knowledge of the encryption key.

Both these conditions should be satisfied even when the encryption and decryption algorithms themselves are known.

The reason for the first condition is obvious, but probably not the second, so I shall briefly explain. This is often also a requirement for information that is sent ‘in the clear’, that is, not encrypted. One method of authentication is for the sender and recipient to share a secret key. The sender uses the key to encrypt a copy of the message, or a portion of it, which is included with the data transfer and, on receipt, the recipient uses the key to decrypt the encrypted data. If the result matches the plaintext message, this provides a reasonable assurance that it was sent by the other key owner, and thus a check on its authenticity. Of course, this assumes that the key has not been compromised in any way. Modern encryption systems are derived from one of two basic systems: symmetric key (sometimes called shared key) systems, and asymmetric key (often called public key) systems.



What is a key in cryptography?:-  A cryptographic key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

 

Uses of Encryption:- Encryption is used in various technologies around us, which can be seen in our everyday lives:

1. Emails: Email encryption prevents unauthorized access to the contents of email messages.

2. Online Transactions: Payment systems, such as credit card transactions, use encryption to secure financial information during transmission.

3. Passwords: Passwords are often stored in an encrypted form to prevent unauthorized access to accounts.

4. Communication: Messaging platforms, including social media apps, use end-to-end encryption to ensure private communications between users.

Almost all the activities you perform online are secured with an encryption algorithm to protect you from internet theft.

 

TYPES OF ENCRYPTION :-

There are two types of encryption algorithms:- symmetric (also called shared key algorithm) and asymmetric (also known as public key algorithm).

(1)      SYMMETRIC ENCRYPTION:-  Also known as public key cryptography, asymmetric encryption is a relatively new method that uses two different but related keys to encrypt and decrypt data. One key is secret and one key is public. The public key is used to encrypt data, and the private key is used to decrypt (and vice versa). Security of the public key is not needed because it is publicly available and can be shared over the internet. A common application of this principle in email security is the DomainKeys Identified Mail (DKIM) record, which uses public / private key pairs to authenticate messages and prevent spoofing          (spoofing means, a deceptive tactic where attackers disguise their identity to impersonate a trusted source (like a person, website, or device)  to trick victims into revealing (close fitting) sensitive information, spreading malware, or gaining unauthorized access, often using fake emails, websites, IP addresses, or caller IDs to appear legitimate.).            Advanced cryptographic methods like quantum key distribution are now emerging to further enhance the security of key exchange beyond traditional asymmetric encryption models.

Asymmetric encryption presents a much stronger option for ensuring the security of information transmitted over the internet. Websites are secured using Secure Socket Layer (SSL) or Transport Layer Security (TLS) certificates. A query to a web server sends back a copy of the digital certificate, and a public key can be extracted from that certificate, while the private key stays private.



Advantages of Symmetric Key Cryptography:-

(1)      Speed and efficiency:- Symmetric key+ algorithms are better suited for encrypting large volumes of data or for use in real-time communication scenarios as they are faster and less resource-intensive than asymmetric cryptography. SKC algorithms do not involve algebraically mathematical operations.

(2)      Scalability:- Because symmetric key algorithms have relatively low computational overhead, they scale well with the number of users and the amount of data being encrypted.

(3)      Simplicity:- Symmetric encryption protocols are often more straightforward to implement and understand than asymmetric key methods, and this would go a long way in attracting developers and users.

Disadvantages and Limitations of Symmetric Key Cryptography:-

(1)      Key management and distribution:- Both the sender and the receiver in the SKC of a message need to have the same key, and the key should not be seen by a third party. In case the key is somehow captured or compromised by a third party, the security of the encrypted data is also lost.

(2)      Non-repudiation:- Non-repudiation refers to the ability to prove that a specific party has sent a message. In SKC, since the same key is used for encryption and decryption, it is impossible to find out which party created a particular cipher text.

 

Popular symmetric encryption algorithms / Common Types of Symmetric Encryption Algorithms:-

(i)       Advanced Encryption Standard (AES):- It has support for three-length keys: 128 bits, 192 bits, or 256 bits, the most commonly used one is a 128-bit key. It includes secure communication, data encryption in storage devices, digital rights management (DRM), and so on.

(ii)      Data Encryption Standard (DES):- Data Encryption Standard (DES) In DES, the 64-bit blocks of plaintext are encrypted using a 56-bit key. This weakness caused by the small key size led to the development of a more secure algorithm, called AES (Advanced Encryption Standard) .

(iii)     Triple Data Encryption Algorithm (Triple DES):- The development of the Triple DES, also called Triple-DES or TDEA, was triggered by the weak security resulting from the small key size in the DES. Triple DES denotes a method of three times applying the DES algorithm sequentially (encrypt-decrypt-encrypt) on every plaintext block.

(iv)     Blowfish and Twofish:- Blowfish, developed in the 1990s, was a fast, flexible algorithm with variable key lengths from 32 to 448 bits. It became popular due to its free availability and lack of patents, making it attractive for commercial and open-source projects. Twofish, its successor and an AES finalist, offers key lengths of up to 256 bits and remains strong and efficient, though it ultimately lost to AES in standardization. Both algorithms are still used in niche systems.

(v)      International Data Encryption Algorithm (IDEA):- IDEA was developed in the early 1990s and became known for its use in Pretty Good Privacy (PGP) for email encryption. It relies on a 128-bit key and provides strong resistance to cryptanalysis. However, IDEA is slower than AES and has licensing restrictions, limiting widespread adoption. While still secure, its practical use has declined in favor of AES and other modern algorithms.

 

  

(2)      ASYMMETRIC ENCRYPTION:- There are two sides in an encrypted communication: the sender, who encrypts the data, and the recipient, who decrypts it. As the name implies, asymmetric encryption is different on each side; the sender and the recipient use two different keys. Asymmetric encryption, also known as public key encryption, uses a public key-private key pairing: data encrypted with the public key can only be decrypted with the private key.

TLS (Transport Layer Security) (or SSL (Secure Sockets Layer )), the protocol that makes HTTPS possible, relies partially on asymmetric encryption. A client will obtain a website's public key from that website's TLS certificate (or SSL certificate) and use that to initiate secure communication. The website keeps the private key secret.

Advantages  of Asymmetric Encryption:-

(1)      In-Transit Security:- Symmetric encryption only works with a single key used for encryption and decryption. With the right strategy, this is a perfectly stable and secure way to manage database or server encryption. Having a single key, however, is a liability when sending data between multiple parties. Asymmetric encryption is much more suitable for public internet data sharing.

(2)      Document Authentication:- Public and private key pairs are necessary for creating security signatures that allow users to authenticate documents. This additional layer of security assures that the sender is who they say they are and that the message has not been tampered with.

(3)      Flexibility:- Asymmetric encryption is flexible and can be used for a wide range of applications, including secure email communication, online banking transactions, and secure access to networks and systems, as long as the private key secret is maintained.

 

Disadvantages Asymmetric Encryption:-

(1)      Speed:- Asymmetric encryption is complex and, therefore, slow. It’s not the best solution for bulk encryption–which means it isn’t the best solution for encrypting servers, hard drives, databases, etc.

(2)      Complexity and Adoption:- To be useful, all parties must use the same form of encryption to share messages. In many cases, this isn’t a problem. For example, all the major internet browsers and providers utilize HTTPS, which means that they have adopted certificate authorities and tools to ensure that HTTPS is seamlessly integrated such that users never have to do a thing. The same is true for email–almost all email providers will use some form of TLS (Transport Layer Security).

 

Asymmetric encryption algorithms:-

(1)      RSA or Rivest–Shamir–Adleman:-  Considered a staple of asymmetric encryption. Designed by the engineers that gave it its name in 1977, RSA uses the factorization of the product of two prime numbers to deliver encryption of 1024-bits and up to 2048-bit key length. According to research conducted in 2010, you would need 1500 years of computational power to crack its smaller 768-bit version!

 

However, this means that it is a slower encryption algorithm. Since it requires two different keys of incredible length, the encryption, and decryption process is slow, but the level of security it provides for sensitive information is incomparable.

With RSA, it is possible to encrypt, decrypt, sign, or verify data. Encryption and verification will use the RSA public key while decryption and signing are done via the private key. Typically, RSA is much slower than symmetric key encryption algorithms, so it should only be used to encrypt small amounts of data. This is generally not a problem because almost all RSA encryption is done as a “digital envelope”. This means bulk data is encrypted using a symmetric algorithm (such as AES or RC5) and the symmetric key is then RSA-encrypted using the recipient’s public key. The recipient can then decrypt using the private key to obtain the symmetric key and decrypt the bulk data.

(2)      DSA:- DSA stands for “Digital Signature Algorithm”. This algorithm can only compute and verify digital signatures. It cannot encrypt or perform key exchange. When DSA is computing a signature, it is not encrypting the digest of the data to sign. It is computing a pair of numbers (called r and s) using the private key, the digest, and a random value. The math works out that using the public key, r, and the digest, it is possible to also compute s. If the s from the signature matches the s the verifier computes, the signature verifies.

Before performing any DSA operation, a fixed set of domain parameters must be set or generated. These parameters define a cyclic multiplicative group of order q in a finite field of p elements. The generator of this group is called g. The commonly used language of “key generation” in the context of DSA also means domain parameter generation.

(3)      ECC (Elliptic Curve Cryptography):-( Elliptic Curve Cryptography (ECC) is a modern approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. It is widely considered a more efficient alternative to older systems like RSA because it provides the same level of security with much smaller key sizes. For example, a 256-bit ECC key offers security comparable to a 3072-bit RSA key.) This method was originally pitched in 1985 by Neal Koblitz and Victor S. Miller, only to be implemented years later in 2004. ECC uses a fairly difficult mathematical operation based on elliptic curves on a finite field, in what is called the Elliptic-curve Diffie–Hellman.

With ECC you have a curve, defined by a math function, a starting point (A), and an ending point (Z) in the curve. The key is that to get to Z, you have done a series of “hops”, or multiplications that resulted in Z. This amount of hops is the private key.



Even if you have the starting and ending point (public key), and the curve, it is nearly impossible to crack the private key. This is because ECC is what is called a “trapdoor”, or a mathematical operation that is easy and quick to complete, but extremely difficult to reverse.

ECC, or ECDH, a mathematical formula is of such strength that it can match a 1024-bit key system with security with a 164-bit key. In its highest setting, 512-bits, ECC can achieve a comparable level of security of a 15360-bit RSA key!

To paint a picture, RSA 2048-bit keys are the banking standard, yet 521-bit ECC delivers the equivalent of a 15360-bit RSA key.

Considering the aforementioned facts, ECC is considered the future of encryption. It’s asymmetric, yet it is able to provide a security level of 256 bits at a maximum key length of 521 bits, which ensures fast encryption speeds with a high complexity of decryption to ensure sensitive data stays safe.

ECC is also extremely attractive for mobile, where processing power is low and data transfers are high.




(4)      Diffie-Hellman:- With Diffie-Hellman, two parties each use their own private key together with the other party’s public key to arrive at a common value called a shared secret. The private keys and shared secret itself never have to take on the risk of being transmitted. Only the public keys need to be transmitted and the shared secret is protected by the difficulty of the discrete log problem. Generally, a digest of the shared secret is then used as a symmetric key for encrypting messages or as input to any other key derivation scheme.

(5)      ElGamal:- This algorithm is based on the difficulty of computing discrete logarithms. It is often used for digital signatures and key exchange. ElGamal encryption is also used in conjunction with other cryptographic techniques to enhance security.

 

INTRODUCTION TO CRYPTOGRAPHY :- (One of the oldest and simplest cryptographic techniques is the Caesar Cipher, which was used by Julius Caesar to send secret military messages., Encryption → Converting Plain Text into Cipher Text ,    Decryption → Converting Cipher Text back into Plain Text )           Cryptography, a word with Greek origins, means “secret writing.” Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. Cryptography is the technique of securing information by converting it into an unreadable form so that only authorized users can access and understand it.

By the CRYPTOGRAPHY, we can protect / Ensures secure communication in the presence of opponents. Protects sensitive data from unauthorized access, Maintains confidentiality, integrity, authentication, and non-repudiation, Converts plaintext into ciphertext using encryption techniques, Plays a vital role in online transactions, digital security, and data protection

 

How Cryptography Works:- Consider two parties: Ajay (Sender) and Anshu (Receiver).

Ajay wants to send a secure message m to Anshu.

Process Overview:-The original message (plaintext) is converted into an unreadable format using an encryption algorithm and a key k.,  The encrypted message is called ciphertext.    The receiver uses the same or a related key to decrypt the ciphertext back into readable form.

 

EXAMPLE WITH CODE:-

Understanding Caesar Cipher, Caesar Cipher works by shifting each letter of the alphabet by a fixed number (called Key or Shift value).

For example:

·         If Key = 3

·         A becomes D

·         B becomes E

·         C becomes F
…and so on.

After Z, it wraps around back to A.


PROBLEM STATEMENT

Convert the word:

CRYPTOGRAPH

Using Caesar Cipher with:

Key = 3

Step-by-Step Encryption Algorithm

Algorithm: Caesar Cipher Encryption

1.      Start

2.      Input the plain text

3.      Input the key (shift value)

4.      For each character in the plain text:

ü  Check if it is an alphabet letter

ü  Find its position in the alphabet (A = 0, B = 1, … Z = 25)

ü  Add the key value

ü  Take modulo 26 to stay within alphabet range

ü  Convert back to a letter

5.      Combine all shifted letters

6.      Output the cipher text

7.      Stop

Detailed Example: Encrypting "CRYPTOGRAPH"

Alphabet positions:-

A=0, B=1, C=2, D=3, ... Z=25

Letter

Position

+3

New Position

Encrypted Letter

C

2

2+3=5

5

F

R

17

17+3=20

20

U

Y

24

24+3=27 % 26 = 1

1

B

P

15

15+3=18

18

S

T

19

19+3=22

22

W

O

14

14+3=17

17

R

G

6

6+3=9

9

J

R

17

17+3=20

20

U

A

0

0+3=3

3

D

P

15

15+3=18

18

S

H

7

7+3=10

10

K


Final Encrypted Output:-

CRYPTOGRAPH → FUBSWRJUDSK

Decryption Algorithm (Reverse Process):-

To get the original word back:-

1.      Start

2.      Input the cipher text

3.      Use the same key (3)

4.      For each letter:

ü  Subtract the key

ü  Take modulo 26 if needed

ü  Convert back to alphabet

5.      Output the original plain text

6.      Stop

FORMULA:-

Encryption:

E(x) = (x + k) % 26

Decryption:-

D(x) = (x - k) % 26

 WHY MODULO 26 IS USED?:-

Because there are 26 letters in the English alphabet.

For example:-

ü  Y (24) + 3 = 27

ü  27 % 26 = 1

ü  1 = B

So after Z, counting starts again from A.

 

(IN HINDI ) ( ONLY FOR HINDI MEDIUM STUDENTS)

 Cryptography को Convert करने का Algorithm (Hindi में आसान भाषा में)

सबसे पहले समझते हैं कि Cryptography क्या होता है।
Cryptography एक ऐसी प्रक्रिया है जिसमें हम अपने साधारण संदेश (Plain Text) को एक गुप्त संदेश (Cipher Text) में बदल देते हैं ताकि कोई तीसरा व्यक्ति उसे पढ़ सके। जब हम गुप्त संदेश को वापस सामान्य संदेश में बदलते हैं, उसे Decryption कहते हैं। Cryptography में सबसे आसान और प्रसिद्ध तकनीक है Caesar Cipher, जिसे Julius Caesar ने उपयोग किया था।

Caesar Cipher Algorithm (Encryption के लिए)

मान लीजिए हमें “CRYPTOGRAPH” शब्द को गुप्त बनाना है।

स्टेप-बाय-स्टेप Algorithm

Step 1: Plain Text (साधारण संदेश) लें।
Plain Text = CRYPTOGRAPH

Step 2: एक Key (Shift value) तय करें।
मान लेते हैं Key = 3

Step 3: हर अक्षर को Alphabet में 3 स्थान आगे बढ़ाएँ।

FORMULA:-

Encrypted Letter = (Original Letter + Key) % 26

(क्योंकि English में 26 अक्षर होते हैं)

Example: CRYPTOGRAPH को Encrypt करना


Original Letter

Shift 3 आगे

Encrypted Letter

C

D E F

F

R

S T U

U

Y

Z A B

B

P

Q R S

S

T

U V W

W

O

P Q R

R

G

H I J

J

R

S T U

U

A

B C D

D

P

Q R S

S

H

I J K

K


Final Encrypted Word:-

CRYPTOGRAPH  →  FUBSWRJUDSK

Decryption Algorithm (वापस Original में बदलना)

Step 1: Cipher Text लें।

Cipher Text = FUBSWRJUDSK

Step 2: वही Key (3) लें।

Step 3: हर अक्षर को 3 स्थान पीछे करें।

Formula:-

Decrypted Letter = (Encrypted Letter - Key) % 26

Result:-    FUBSWRJUDSK  →  CRYPTOGRAPH

पूरा Algorithm:-

Algorithm: Caesar Cipher Encryption:-

1.      Start

2.      Plain text input करें

3.      Key (shift value) input करें

4.      हर अक्षर के लिए:

ü  Alphabet में उसकी position निकालें

ü  उसमें key जोड़ें

ü  Result को 26 से mod करें

ü  नया अक्षर बनाएं

5.      सभी अक्षरों को जोड़कर Cipher text बनाएं

6.      Stop




CRYPTOGRAPHIC ALGORITHMS AND TECHNIQUES:-

 

CRYPTOGRAPHIC ALGORITHMS :-          Cryptography involves the practice of encrypting and decrypting information to ensure it is kept private and secure from unintended parties. Cryptography was first used in about 1900 BC in Ancient Egypt with substituted hieroglyphics to secure communication. A cryptographic algorithm is the mathematical equation used to scramble (struggle) the plain text and make it unreadable. They are used for data encryption, authentication and digital signatures.

Before exploring the algorithms themselves, it’s important to grasp several foundational concepts that underpin cryptographic processes:

Plaintext (Cleartext):- Unencrypted data in its original, readable form.

Ciphertext:- The encrypted form of data, which is unintelligible without the appropriate decryption key.

Algorithm:- A step-by-step procedure used to encrypt and decrypt data.

Cryptanalysis: The practice of breaking cryptographic systems and uncovering encrypted information without access to the key.

 

THE FOUR PRIMARY TYPES OF CRYPTOGRAPHIC ALGORITHMS TECHNIQUES:-

(1)      Symmetric encryption

(2)      Asymmetric encryption

(3)      Hashing algorithms

(4)      Digital Signatures

 

(1)      SYMMETRIC ENCRYPTION:- Symmetric encryption is one of the most basic yet effective methods of securing data. In symmetric encryption, both the sender and the recipient use the same secret key to encrypt and decrypt the data. The main advantage of this approach is its speed and efficiency, making it suitable for encrypting large amounts of data. However, the significant challenge lies in securely sharing the secret key. If an unauthorized party intercepts the key, the entire communication is compromised.

 

Types of Symmetric Algorithms:-

(a)      Substitution Ciphers:-  These algorithms replace each character of the plaintext with a corresponding character in the ciphertext. For example, the ROT13 cipher shifts each letter of the alphabet 13 positions forward, transforming “HELLO” into “URYYB”.

(b)      Transposition Ciphers: Rather than altering the characters themselves, transposition ciphers rearrange the characters of the plaintext according to a specific pattern. For instance, the phrase “HELLO WORLD” could be rearranged as “HLOOLELWRD” based on a predetermined order.

Example of Symmetric Encryption:-

ANSHU and DEEPAK  agree on a cipher and a secret key.

ANSHU encrypts a message using this shared key.

ANSHU sends the encrypted message (ciphertext) to DEEPAK.

DEEPAK decrypts the message using the same key.

 

(EXAMPLE IN HINDI ( ONLY FOR HINDI MEDIUM STUDENTS) :-  

Symmetric encryption ek aisa cryptographic algorithm hai jisme same key (secret key) ka use karke data ko encrypt (lock) aur decrypt (unlock) kiya jata hai.

Means:-

(a) Ek secret key hoti hai,    

(b)      Sender aur Receiver dono ke paas same key honi chahiye

(c  )    Isi key se message ko encode aur decode kiya jata hai

(d) Isliye ise Secret Key Encryption bhi bolte hain.

 

EXAMPLE OF HASH ALGORITHMS FOR HINDI OR ENGLISH MEDIUM STUDENTS:-

Real Life Example (Simple Understanding):-

 Imagine:-

(a) You put a letter in a box.

(b) You close that box with a lock.

(c ) The receiver also has the same key.

(d ) He opens the box with the same key.

 Here:-

(a) Lock = Encryption Algorithm

(b) Key = Secret Key

(c ) Letter = Plaintext (original message)

Technical Terms:-

Term

Meaning

Plaintext

Original message

Ciphertext

Encrypted message

Key

Secret password

Encryption

Plaintext → Ciphertext

Decryption

Ciphertext → Plaintext


Step-by-Step Example (Simple Mathematical Method):-

Suppose:-

Plaintext = HELLO

Secret Key = 3

Here we will use a simple character shifting method (Caesar style shift).

Each letter will be shifted 3 positions forward.

 

Step 1: Convert Plaintext Into Numbers

A = 0

B = 1

C = 2

-----

----

Z = 25

Write HELLO in numbers:

H = 7
E = 4
L = 11
L = 11
O = 14

 

Step 2: Apply Encryption Formula
Formula:-
Ciphertext = (Plaintext + Key) mod 26
Key = 3
Now apply it to each letter:

H → (7 + 3) = 10 → K
E → (4 + 3) = 7 → H
L → (11 + 3) = 14 → O
L → (11 + 3) = 14 → O
O → (14 + 3) = 17 → R

Encrypted Message Obtained (Ciphertext)

KHOOR

Now if a hacker sees it, he will get "KHOOR", not the original message.

 

Step 3: Decryption Process

Now the receiver has the same key (3).

Formula:-

Plaintext = (Ciphertext − Key) mod 26

K → (10 − 3) = 7 → H

H → (7 − 3) = 4 → E

O → (14 − 3) = 11 → L

O → (14 − 3) = 11 → L

R → (17 − 3) = 14 → O

Result:- HELLO, The message has been received back.

EXAMPLE OF HASH ALGORITHMS FOR HINDI MEDIUM STUDENTS:-

Real Life Example (Simple Understanding):-

 

Sochiye:-

(a)      Aap ek box me letter daalte ho.

(b)      Aap us box ko ek taale (lock) se band kar dete ho.

(c  )    Receiver ke paas bhi same chabi (key) hai.

(d )     Wo usi chabi se box kholta hai.

Yaha per:-

(a)        Lock = Encryption Algorithm

(b)        Key = Secret Key

(c  )      Letter = Plaintext (original message)

Technical Terms:-

Term

Meaning

Plaintext

Original message

Ciphertext

Encrypted message

Key

Secret password

Encryption

Plaintext → Ciphertext

Decryption

Ciphertext → Plaintext


Step-by-Step Example (Simple Mathematical Method):-

Suppose:-

Plaintext = HELLO

Secret Key = 3

Yaha hum simple character shifting method use karenge (Caesar style shift).

Har letter ko 3 position aage shift karenge.

 

Step 1: Plaintext Ko Number Me Convert Kare

A = 0

B = 1

C = 2

---

---

Z = 25

HELLO ko numbers me likhen:

H = 7
E = 4
L = 11
L = 11
O = 14

 Step 2: Encryption Formula Apply Kare

Formula:-

Ciphertext = (Plaintext + Key) mod 26

Key = 3

Ab har letter par apply karte hain:

H → (7 + 3) = 10 → K
E → (4 + 3) = 7 → H
L → (11 + 3) = 14 → O
L → (11 + 3) = 14 → O
O → (14 + 3) = 17 → R

Encrypted Message Mila (Ciphertext)

KHOOR

Ab agar koi hacker dekhega to usko "KHOOR" milega, asli message nahi milega.

 Step 3: Decryption Process

Ab receiver ke paas same key (3) hai.

Formula:-

Plaintext = (Ciphertext − Key) mod 26

K → (10 − 3) = 7 → H
H → (7 − 3) = 4 → E
O → (14 − 3) = 11 → L
O → (14 − 3) = 11 → L
R → (17 − 3) = 14 → O

Result:- HELLO,   Message wapas mil gaya hai.



(2)      ASYMMETRIC ENCRYPTION:- Asymmetric encryption solves the key distribution problem inherent in symmetric encryption by using two distinct keys:- a public key and a private key. The public key is shared openly and used to encrypt messages, while the private key is kept secret and used to decrypt them. This approach ensures that even if a malicious actor intercepts the public key, they cannot decrypt the message without access to the corresponding private key.

Example of Asymmetric Encryption in Practice:-

DEEPAK generates a public-private key pair.

DEEPAK shares the public key with ANSHU.

ANSHU encrypts her message using DEEPAK’S public key.

DEEPAK decrypts the message using his private key.

 

EXAMPLE OF HASH ALGORITHMS FOR HINDI OR ENGLISH MEDIUM STUDENTS:-

Asymmetric Encryption (Public Key Cryptography)

Asymmetric Encryption is a cryptographic algorithm in which two different keys are used:

(1) Public Key – can be shared with everyone

(2) Private Key – kept secret (only with the owner)

Therefore, it is also called Public Key Cryptography.

Simple Definition:- Asymmetric Encryption is a technique in which:

(1) Public Key is used to encrypt the data

(2) Private Key is used to decrypt the data

And both keys are mathematically related, but it is practically impossible to derive the private key from the public key.

Asymmetric Encryption Working (Step by Step Example)

Real Life Example (Message Sending):-

Suppose:- Ram wants to send a secret message to Shyam,   Shyam has 2 keys:
(1) Public Key

and
(2) Private Key

Step 1: Key Generation:-

Shyam uses an algorithm (like RSA) on his computer to:

ü  Generate a Public Key

ü  Generate a Private Key

He gives the public key to everyone.

He keeps the private key secret.

Step 2: Encryption:-

Ram encrypts the message using Shyam’s Public Key.

Message:- HELLO

After encryption, it may look something like:-

XJ92KQ7L

Now it is unreadable.

Step 3: Decryption:- Shyam decrypts the encrypted message using his Private Key.

Result:- HELLO

 

EXAMPLE HOW TO CHANGE ASYMMETRIC ENCRYPTION IN SYMMETRIC

( ONLY FOR HINDI MEDIUM STUDENTS)

Asymmetric Encryption (Public Key Cryptography)

Asymmetric Encryption ek cryptographic algorithm hai jisme do alag-alag keys use hoti hain:

(1)      Public Key – sabke saath share ki ja sakti hai

(2)      Private Key – secret rakhi jaati hai (sirf owner ke paas)

Isliye ise Public Key Cryptography bhi kehte hain.

Simple Definition:-  Asymmetric Encryption ek aisi technique hai jisme:

(1)      Data ko encrypt karne ke liye Public Key use hoti hai

(2)      Data ko decrypt karne ke liye Private Key use hoti hai

Aur dono keys mathematically related hoti hain, lekin public key se private key nikalna practically impossible hota hai.

Asymmetric Encryption Ka Working (Step by Step Example)

Real Life Example (Message Sending):-

 

Maan lo:- Ram ko Shyam ko secret message bhejna hai,    Shyam ke paas 2 keys hain:

(1)      Public Key  and (2)     Private Key

Step 1: Key Generation:-

Shyam apne computer me algorithm (jaise RSA) use karke:

ü  Ek Public Key generate karta hai

ü  Ek Private Key generate karta hai

Public key sabko de deta hai.
Private key secret rakhta hai.

Step 2: Encryption:-

Ram, Shyam ki Public Key se message encrypt karta hai.

Message:- HELLO

Encrypt hone ke baad kuch aisa ban sakta hai:- XJ92KQ7L,  Ab ye unreadable hai.

Step 3: Decryption:- Shyam apni Private Key se encrypted message ko decrypt karta hai.

Result:- HELLO



EXAMPLE OF HASH ALGORITHMS FOR HINDI OR ENGLISH MEDIUM STUDENTS:-

(NOTE:- We are using small numbers only for understanding. In real life, RSA uses very large prime numbers of 2048-bit or 4096-bit.)

Algorithm:- RSA

Asymmetric encryption is mainly based on mathematics (prime numbers).

Example (Simplified RSA Concept):-

STEP 1:- Choose Two Prime Numbers:-

p = 3, q = 11

STEP 2:- Calculate n, Formula:- n = p × q

So, n = 3 × 11

n = 33

This n will be used in both the public key and the private key.

STEP 3: Calculate φ(n) (Phi Function)

In RSA, there is an important value:-

φ(n) = (p - 1)(q - 1)

 

So,

φ(n) = (3 - 1)(11 - 1)

φ(n) = 2 × 10

φ(n) = 20

STEP 4: Choose e for the Public Key

Condition:-

(1) e < φ(n)

(2) e and φ(n) should be co-prime (GCD = 1)

(NOTE:- Greatest Common Divisor. It represents the largest positive integer that divides two or more integers without leaving a remainder. Also known as the Highest Common Factor (HCF) or Greatest Common Factor (GCF), it is commonly used to simplify fractions and in number theory.)

Here:- φ(n) = 20

We choose e = 3.

Check:-

GCD(3, 20) = 1

Therefore, it is valid.

PUBLIC KEY:-

Public Key = (e, n)

Public Key = (3, 33)

This can be shared with everyone.

STEP 5: Find d for the Private Key

Condition:- (d × e) mod φ(n) = 1

That means:- (d × 3) mod 20 = 1

Now we find d:-

Try values:-

3 × 7 = 21

21 mod 20 = 1

So, d = 7

Private Key:-

Private Key = (d, n)

Private Key = (7, 33)

This is kept secret.

STEP 6: Encryption Process

Formula:- Ciphertext = (Message ^ e) mod n

Suppose message = 4

Public key = (3, 33)

So,

Ciphertext = (4 ^ 3) mod 33

Ciphertext = 64 mod 33

33 × 1 = 33

64 - 33 = 31

So, Ciphertext = 31

Encrypted message = 31

STEP 7: Decryption Process

Formula:- Message = (Ciphertext ^ d) mod n

Private key = (7, 33)

So,

Message = (31 ^ 7) mod 33

31 mod 33 = 31

31² = 961

961 mod 33:-

33 × 29 = 957

961 - 957 = 4

So:

31² mod 33 = 4

Now break the powers:

31 = 31^ (2×3 + 1)

After mathematical simplification, the result:

Message = 4

The original message is obtained back.

 FINAL SUMMARY REPORT FOR EASY UNDERSTANDING :-

Step

Value

p

3

q

11

n

33

φ(n)

20

e

3

d

7

Public Key

(3, 33)

Private Key

(7, 33)


EXAMPLE OF MATHEMATICAL EXAMPLE (SIMPLE UNDERSTANDING)

(NOTE:-  Hum chhote numbers use kar rahe hain sirf samajhne ke liye. Real life me RSA me 2048-bit ya 4096-bit ke bahut bade prime numbers use hote hain.)

 

Algorithm:-  RSA

Asymmetric encryption mainly mathematics (prime numbers) par based hota hai.

Example (Simplified RSA Concept):-

STEP 1: Do Prime Numbers Choose Karo :- p = 3, q = 11

STEP 2: n Calculate Karo, Formula:- n = p × q

So, n = 3 × 11,   n = 33,   Ye n public key aur private key dono me use hoga.

STEP 3: φ(n) (Phi Function) Calculate Karo

RSA me ek important value hoti hai:-

φ(n) = (p - 1)(q - 1)

So,

φ(n) = (3 - 1)(11 - 1)

φ(n) = 2 × 10

φ(n) = 20

STEP 4: Public Key ka e Choose Karo

Condition:-

(1)      e < φ(n)

(2)      e aur φ(n) co-prime hone chahiye (GCD = 1)

(NOTE:- Greatest Common Divisor. It represents the largest positive integer that divides two or more integers without leaving a remainder. Also known as the Highest Common Factor (HCF) or Greatest Common Factor (GCF), it is commonly used to simplify fractions and in number theory. )

Yaha:- φ(n) = 20

Hum e = 3 choose karte hain.

Check karo:

GCD(3, 20) = 1 ✔, Isliye valid hai.

 PUBLIC KEY:-

Public Key = (e, n)

Public Key = (3, 33)

Ye sabko batayi ja sakti hai.

STEP 5: Private Key ka d Find Karo

Condition:- (d × e) mod φ(n) = 1

Yani:- (d × 3) mod 20 = 1

Ab d find karte hain:-

Try values:-

3 × 7 = 21

 

21 mod 20 = 1

So, d = 7

Private Key:- Private Key = (d, n),   Private Key = (7, 33)

Ye secret rakhi jaati hai.

STEP 6: Encryption Process

Formula:- Ciphertext = (Message ^ e) mod n

Maan lo message = 4

Public key = (3, 33)

So,

Ciphertext = (4 ^ 3) mod 33

Ciphertext = 64 mod 33

33 × 1 = 33

64 - 33 = 31

So, Ciphertext = 31

Encrypted message = 31

STEP 7: Decryption Process

Formula:- Message = (Ciphertext ^ d) mod n

Private key = (7, 33)

So, Message = (31 ^ 7) mod 33

31 mod 33 = 31

31² = 961

961 mod 33:-

33 × 29 = 957

961 - 957 = 4

Toh:

31² mod 33 = 4

Ab powers break karte hain:

31 = 31^ (2×3 +1)

Mathematical simplification ke baad result:

Message = 4,       Original message wapas mil gaya.

FINAL SUMMARY REPORT FOR EASY UNDERSTANDING :- 

Step

Value

p

3

q

11

n

33

φ(n)

20

e

3

d

7

Public Key

(3, 33)

Private Key

(7, 33)




(3)      HASH-FUNCTION / HASHING ALGORITHMS :- No key is used in this algorithm, but a fixed-length value (It is also known as a hash or digest, small digest or “hash value”) is calculated from the plaintext, which makes it impossible for the contents of the plaintext to be recovered. Hash functions are often used by computer systems to encrypt passwords.

Hashing is not intended (projected) for encryption or decryption but instead (in its place) serves to verify data integrity. Even the slightest change to the input will result in a completely different hash, making it a crucial tool for ensuring data integrity.

Use for Hashing function:-

(a)      Password Storage:- Instead of storing plaintext passwords, systems store hashes. When a user inputs their password, the system compares the hash of the entered password to the stored hash. If they match, the password is correct.

(b)      File Integrity:- After downloading a file, a user can verify its integrity by comparing the file’s hash to a known, trusted hash provided by the source.

Hash Algorithms are:-

(1)      SHA-256 (Secure Hash Algorithm): One of the most secure and widely used hash functions, generating a 256-bit hash.

(2)      MD5 (Message Digest Algorithm): Produces a 128-bit hash but is vulnerable (weak) to collision attacks, where two different inputs produce the same hash, making it less secure for modern use.

 

EXAMPLE OF HASH ALGORITHMS FOR HINDI OR ENGLISH MEDIUM STUDENTS:-

 

A Hash Function is a special mathematical function that takes input data of any size and converts it into a fixed-size output. This output is called a Hash Value, Digest, or Message Digest.
No matter whether the input is 5 characters long or a 5 GB file — the output will always be of the same length.

Simple Definition:- A Hash Function is a one-way function which:-

ü  It does not encrypt the data

ü  It converts data into a fixed-size code

ü  Reverse (getting back the original data) is practically impossible

Real Life Example:- Imagine you have a book., If I create one unique short code for the entire book,

like:- Original Book → "My Network Security Notes"

Hash Output → 5F4DCC3B5AA765D61D8327DEB882CF99

If even a single letter in the book is changed, the hash will completely change.

 

Important Properties of Cryptographic Hash Function:-
(1) Fixed Length Output:- Whether the input is small or large, the output will be of fixed length.
(2) Deterministic:- Same input → Same output (always)
(3) One-Way Function:- It is not possible to retrieve the original data from the hash.
(4) Avalanche Effect:- 1 bit change in input → Output completely different
(5) Collision Resistant:- It is very difficult for two different inputs to produce the same hash.

 

Step-by-Step Easy Example (Conceptual):- Suppose there is a simple hashing formula:-
Hash = Sum of ASCII values mod 100
Step 1: Input:- Input = "ABC"
Step 2: ASCII Values:-
A = 65, B = 66, C = 67
Step 3: Sum
65 + 66 + 67 = 198
Step 4: mod 100
198 mod 100 = 98
Hash Value = 98

 IF WE CHANGE THE INPUT:- INPUT = "ABD"

ASCII:-
A=65, B=66, D=68
Sum:- 65 + 66 + 68 = 199
mod 100:-
199 mod 100 = 99
See, only one letter changed, the hash changed from 98 to 99.
This is just a simple example. Real cryptographic hash algorithms are very complex.

 WHERE IS HASHING USED?

(1) Password Storage:- When you enter a password:-
Example:- Password: Ajay123
The system does not store the password.
It stores:- Code:- SHA-256(Ajay123) = Some long hash value

At login time:- The user will enter the password, The system will generate its hash,
It will compare it with the stored hash, If match → Login successful

 (2) Data Integrity Check:- While downloading a file, the website provides a hash:

Code:- Original File Hash = ABC123XYZ
After download:- You generate the hash yourself, Compare it,
If match → File is safe
If different → File is corrupted or tampered


(3) Digital Signature:- In digital signature:- First, the hash of the message is created,
Then the hash is encrypted using the private key.

EXAMPLE OF HASH ALGORITHMS FOR HINDI MEDIUM STUDENTS ONLY:-

 

Hash Function / Hashing Algorithm (Cryptographic Algorithms):- Hash Function ek special mathematical function hota hai jo kisi bhi size ke input data ko lekar usko fixed-size output me convert karta hai. Is output ko Hash Value, Digest, ya Message Digest kaha jata hai.

Input chahe 5 character ka ho ya 5 GB ka file ho — output hamesha same length ka hoga.

 

Simple Definition:-  Hash Function ek one-way function hota hai jo:-

ü  Data ko encrypt nahi karta

ü  Data ko fixed-size code me convert karta hai

ü  Reverse (original data wapas lana) practically impossible hota hai

Real Life Example:- Socho aap ke paas ek book hai.,  Agar main puri book ka ek unique short code bana du,

jaise:- Original Book → "My Network Security Notes"

Hash Output → 5F4DCC3B5AA765D61D8327DEB882CF99

Agar book me ek bhi letter change kar diya jaye, to hash completely change ho jayega.

 

Important Properties of Cryptographic Hash Function:-

(1)      Fixed Length Output:- Chahe input chhota ho ya bada, output fixed length ka hoga.

(2)      Deterministic:- Same input → Same output (hamesha)

(3)      One-Way Function:- Hash se original data wapas nikalna possible nahi hota.

(4)      Avalanche Effect:- Input me 1 bit change → Output completely different

(5)      Collision Resistant:- Do alag inputs ka same hash milna bahut mushkil hota hai.

 

Step-by-Step Easy Example (Conceptual):- Man lo ek simple hashing formula hai:-

Hash = Sum of ASCII values mod 100

Step 1: Input:- Input = "ABC"

Step 2: ASCII Values:-

A = 65, B = 66, C = 67

Step 3: Sum

65 + 66 + 67 = 198

Step 4: mod 100

198 mod 100 = 98

Hash Value = 98

 

AGAR INPUT CHANGE KARE:- INPUT = "ABD"

ASCII:-

A=65, B=66, D=68

Sum:- 65 + 66 + 68 = 199

mod 100:-

199 mod 100 = 99

Dekho sirf ek letter change hua, hash 98 se 99 ho gaya.

Ye sirf simple example hai. Real cryptographic hash algorithms bahut complex hote hain.

 

HASHING KA USE KAHAN HOTA HAI?

(1)      Password Storage:- Jab aap password enter karte ho:-

Example:- Password: Ajay123

System password ko store nahi karta.

Woh store karta hai:- Code:- SHA-256(Ajay123) = Some long hash value

 

Login ke time:- User password enter karega,    System uska hash banayega, 

Compare karega stored hash se,  Agar match → Login successful

 

(2)      Data Integrity Check:- File download karte waqt website hash provide karti hai:

Code:- Original File Hash = ABC123XYZ

Download ke baad:- Aap khud hash generate karo, Compare karo , 

Agar match → File safe hai

Agar different → File corrupted ya tampered

(3)      Digital Signature:- Digital signature me:- Pehle message ka hash banaya jata hai,

Phir hash ko private key se encrypt kiya jata hai.

 

 

 (4)     DIGITAL SIGNATURES:-

A Digital Signature is a specific type of Electronic Signature (e-Signature). Digital Signatures provide a type of digital ID which is unique to the person who is signing a document.

A digital signature is a cryptographic technique used to verify the authenticity, integrity, and non-repudiation of a digital message or document. It ensures that the message was created by a known sender and that it has not been altered during transmission. To do this, Digital Signatures use Public Key Infrastructure (PKI), Digital Certificates and Qualified Timestamps to guarantee the highest level of security and legal acceptance worldwide. 

How does it work?:-

A digital signature for an electronic message is created by using a form of cryptography and is equivalent to a personal signature on a written document. The digital signature on a message provides a unique electronic binding of the identity of the signer to the origin of the message. A digital signature provides proof of the message origin and a method to verify the integrity of the message. A digital certificate owner combines the data to be signed with their private key, and then transforms the data with an algorithm. The recipient of the message uses the corresponding certificate public key to decrypt the signature. The public key decryption also verifies the integrity of the signed message and verifies the sender as the source. Only the organization with the private key can create the digital signature. However, anyone that has access to the corresponding public key can verify the digital signature.

Example:-

Suppose a university sends a digital mark sheet., The university signs it digitally.

If anyone modifies the marks, the signature becomes invalid






The steps of the digital signature process are as follows:-

1.      The sender computes a message digest (with an algorithm such as RSA or SHA1) and then encrypts the digest with their private key, which forms the digital signature. Multiple signatures and signature formats can be attached to a message, each referencing different (or even overlapping) parts of the message.

2.      The sender transmits the digital signature with the message.

3.      The receiver decrypts the digital signature with the public key of the sender, thus regenerating the message digest.

4.      The receiver computes a message digest from the message data that was received, and verifies that the two digests are the same. If these digests match, the message is both intact and authentic.

What are the ADVANTAGES of digital signatures?

(1)      Security:- Security capabilities are embedded in digital signatures to ensure a legal document isn't altered and signatures are legitimate. Security features include asymmetric cryptography, personal identification numbers (PINs), checksums and cyclic redundancy checks (CRCs), as well as CA (Certificate Authority )and trust service provider (TSP) validation.

(2)      Timestamping:- This provides the date and time of a digital signature and is useful when timing is critical, such as for stock trades, lottery ticket issuance and legal proceedings.

(3)      Globally accepted and legally compliant:-  The public key infrastructure (PKI) standard ensures vendor-generated keys are made and stored securely. With digital signatures becoming an international standard, more countries are accepting them as legally binding.

(4)      Time savings:- Digital signatures simplify the time-consuming processes of physical document signing, storage and exchange, letting businesses quickly access and sign documents.

(5)      Cost savings:-  Organizations can go paperless and save money previously spent on the physical resources, time, personnel and office space used to manage and transport documents.

 

 

WHAT IS A DIGITAL CERTIFICATE?:- Digital certificates, also known as identity certificates or public key certificates, are a form of electronic password using the public key infrastructure (PKI) that allows individuals and organizations to exchange data over the internet in a secure manner.

Creating a valid Digital Signature using PKI requires a Digital Certificate. Sometimes known as a Public Key Certificate or Digital ID, a Digital Certificate is an electronic document used in Public Key Cryptography to verify an identity, such as a person signing a document.

Public Key Cryptography - also known as Public Key Encryption - works with cryptographic key pairs: Private Keys and Public Keys. These key pairs are used to encrypt and decrypt data. Once data is encrypted by one of the keys, it can only be decrypted by its key pair.

A Digital Certificate binds an identity to a key pair.

In other words, a Digital Certificate acts like a form of electronic identification for the person signing the agreement. Usually Digital Certificates are issued by a trusted third party called a Certificate Authority (CA) who holds the Public Key.

 

A digital certificate contains the following identifiable information:

ü  User’s name

ü  Company or department of user

ü  IP (internet protocol) address or serial number of device

ü  Copy of the public key from a certificate holder

ü  Duration of time the certificate is valid for

ü  Domain certificate is authorized to represent

 

Components of A Digital Certificate:-

(1)      Public Key:- There is a pair of keys when it comes to a digital certificate. One of those keys is a public key. This key is used when the system encodes or encrypts the data or message that is intended to be sent to the certificate holder.

(2)      Private Key:- The private key is with the user who will receive the message or data. When the user enters this key, the data will be decoded or decrypted and will be readable as per human understanding. The digital certificate landscape relies on the security of this private key.

(3)      Certificate Authority (CA):- A CA is an authoritative organisation that is responsible for certifying entities by validating their identities for a digital certificate. The CA conducts a strict digital certificate authentication procedure before allotting the certificate to any entity to keep the legitimacy of the security tool.

(4)      Registration Authority (RA):- Registration authority is the middleman between the user and the CA. It is deemed responsible for verifying the identity of the entity or individual applying for the certificate. Then, the process is passed on to the CA.

(5)      Certificate Database:- A certificate database is a storage system of all the digital certificates in order to manage and administer them. This database includes a record of all the issued certificates, public keys associated with those certificates, all the relevant metadata, etc. This is essential in the validation process, ensuring the authenticity of certificates.

Types of Digital Certificates:-

(1)      TLS/SSL certificate;- A TLS/SSL  (Transport Layer Security / Secure Sockets Layer) certificate sits on a server— such as an application, mail, or web server—to ensure communication with its clients is private and encrypted. The certificate provides authentication for the server to send and receive encrypted messages to clients. The existence of a TLS/SSL certificate is signified by the Hypertext Transfer Protocol Secure (HTTPS) designation at the start of a Uniform Resource Locator (URL) or web address.

It comes in three forms:-

(a)      Domain validated:- A domain validated certificate is a quick validation method that is acceptable for any website. It is cheap to obtain and can be issued in a matter of minutes.

(b)      Organization validated:- This provides light business authentication and is ideal for organizations selling products online through e-commerce.

( c )    Extended validation:- This offers full business authentication, which is required by larger organizations or any business dealing with highly sensitive information. It is typically used by businesses in the financial industry and offers the highest level of authentication, security, and trust.

(d)      Code signing certificate:- A code signing certificate is used to confirm the authenticity of software or files downloaded through the internet. The developer or publisher signs the software to confirm that it is genuine to users that download it. This is useful for software providers that make their programs available on third-party sites to prove that files have not been tampered with.

(e) Client certificate:- A client certificate is a digital ID that identifies an individual user to another user or machine, or one machine to another. A common example of this is email, where a sender signs a communication digitally and its signature is verified by the recipient. Client certificates can also be used to help users access protected databases.

 

THE END UNIT 2 (CRYPTOGRAPHY AND ENCRYPTION)












No comments:

Post a Comment

PLEASE DO LEAVE YOUR COMMENTS

UNIT 5 SOFTWARE TESTING (UNIT NAME) :- TEST AUTOMATION TOOLS AND EMERGING TRENDS

  DR. AJAY KUMAR PATHAK  ASSISTANT PROFESSOR READ  ALL THE NOTES CHAPTER WISE   MINOR PAPER   SUBJECT NAME:-   MN–2C (Th):- SOFTWARE TESTING...