I/O hardware, buffering, disk I/O, RAID, disk cache.
File Management system, File Accessing Methods, File Directories, File Allocation Methods, File Space Management, Disk Space Management, Record blocking.
Cryptography is a complex field that involves techniques to secure communication and protect data privacy. It's essential for secure online transactions, data storage, and more.
At its core, cryptography relies on two main concepts:
Encryption is the process of converting readable data (plaintext) into an unreadable form (ciphertext). This is done using a mathematical algorithm and a cryptographic key. The key acts like a password and determines how the data is transformed.
Decryption is the reverse process of encryption. It involves converting ciphertext back into plaintext using the same algorithm and the correct key. Only those with the correct key can successfully decrypt the data.
There are various types of cryptography such as
In symmetric cryptography, the same key is used for both encryption and decryption. This simplicity comes with a challenge β securely sharing the key between parties without exposing it to attackers.
Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption. Data encrypted with the public key can only be decrypted with the corresponding private key, providing a more secure way to share encrypted information.
Cryptography finds applications in various areas:
It ensures that messages exchanged between parties remain confidential and tamper-proof. For example, HTTPS protocols secure data transmission over the internet.
Cryptography can detect if data has been altered during transmission. Hash functions are used to generate fixed-size values (hashes) that uniquely represent data.
Cryptography helps verify the identity of users or systems. Digital signatures use asymmetric cryptography to provide authenticity and integrity to messages.
Encryption safeguards sensitive information stored on devices or in the cloud, preventing unauthorized access even if the data is compromised.
Digital signatures are akin to your online handwritten signature, providing authenticity and integrity to digital documents.
User authentication is the process of confirming a user's identity to provide access to secure systems or resources.
MFA combines two or more authentication factors to enhance security.
Did this doc help you?
Help us make these docs great!
All these documentations are open source. See something that's wrong or unclear? Submit a pull request.
Still need help? Ask the GitHub community
Contact support @Chetan Raut