Cryptography: Primer

Arun S M
2 min readJun 7, 2024

--

Cryptography, a sophisticated field, stretches beyond just securing communication. It ensures data integrity, authentication, and non-repudiation. This intricate science beautifully merges mathematics, computer science, and engineering.

At the heart of cryptography is the design of algorithms and protocols. These tools encrypt and decrypt messages, thereby safeguarding data during transmission and storage. However, the scope of cryptography transcends this, delving into diverse methods used to decode these complex systems and authenticate identities.

In my comprehensive series of blog articles, I will explore numerous subfields of cryptography. These include symmetric and asymmetric encryption, hash functions, digital signatures, and public key infrastructure — all essential components in ensuring data integrity and secure communication.

The significance of cryptography is unparalleled in various domains, including secure web browsing, online banking, digital currencies, and computer password protection. Furthermore, it plays a pivotal role in data authentication, ensuring that the data’s origin and delivery are verifiable and undeniable. Delving into the study of cryptography broadens one’s understanding of online security and privacy, unveiling the extensive applications of this intricate field.

The foundation of digital security is based on the CIA triad, which stands for Confidentiality, Integrity, and Availability. These are the three key principles that should be guaranteed in every kind of secure system.

  1. Confidentiality: This principle ensures that the information is accessible only to those who are authorized to view it. It involves the encryption of data to restrict access to the contents of the data or message. In this context, cryptography ensures confidentiality by using various encryption algorithms that make the data unreadable to unauthorized users.
  2. Integrity: This principle ensures that the information is protected from unauthorized modification or deletion. It confirms that the data received is exactly the same as it was sent, without any alteration. Cryptography can provide data integrity by using hashing algorithms that allow the receiver to verify that the data has not been tampered with during transmission.
  3. Availability: This principle ensures that information and resources are available to authorized users whenever they need them. This includes ensuring the systems, hardware, and software are working correctly and are accessible when needed. Cryptography doesn’t directly ensure availability, but it indirectly contributes to it by ensuring the confidentiality and integrity of data, hence protecting the system from attacks that may lead to unavailability.

Understanding these principles is essential for anyone working with systems that require the secure storage or transmission of data.

--

--

Arun S M
Arun S M

Written by Arun S M

Engineer. Leader. Curious Soul. There’s so much space to grow this list!

No responses yet