What is cryptography?

Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email.

Cryptography is closely related to the disciplines of [cryptolog It includes techniques such as microdots, merging words with images and other ways to hide information in storage or transit. However, in today’s computer-centric world, cryptography is most often associated with scrambling [plaintext] (ordinary text, sometimes referred to as cleartext) into [ciphertext](a process called [encryption, then back again (known as decryption). Individuals who practice this field are known as cryptographers.

• The study of secure communications techniques that allow only the sender and intended recipient of a message to read its contents is known as cryptography.
• It’s closely linked to encryption, which is the process of scrambling plain text into ciphertext and then back again when it’s received.
• In addition, cryptography includes techniques such as microdots and merging to obfuscate information in photographs.
• Encrypting and decrypting email and other plain-text messages is the most prevalent usage of cryptography when transporting electronic data.
• The symmetric or “secret key” approach is the most basic method.
• Data is encrypted with a secret key, and the encoded message and secret key are then delivered to the recipient for decoding.
• A third party has all the loopholes they need to decrypt and read the message if it is intercepted.
• Cryptologists invented the asymmetric or “public key” scheme to address the above-mentioned problem.