Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is considered a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through untrusted network communication paths. One of the goals of cryptography, and the mechanisms that …show more content…
Cryptography scrambles a message to conceal its contents; steganography conceals the existence of a message. Computer security is the collection of tools designed to protect data and to prevent hackers [4].
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information and transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers …show more content…
A cryptanalyst is someone who engages in cryptanalysis. [8].
The term cryptanalysis is derived from the Greek words “krypt´os” and “anal´yein,” standing for “to loosen.” Consequently, the meaning of the term can be paraphrased as “loosen the hidden word.” This paraphrase refers to the process of destroying the cryptographic protection, or more generally to study the security properties and possibilities to break cryptographic techniques and systems [9].
Cryptology embraces both cryptography and cryptanalysis. The term cryptology is derived from the Greek words “krypt´os,” standing for “hidden,” and “l´ogos,” standing for “word.” Consequently, the meaning of the term cryptology is best paraphrased as “hidden word.” [9].
If we look at the types of cryptographic algorithms that exist in a little bit more detail, we see that the symmetric ciphers can be divided into stream ciphers and block ciphers, as shown in Fig.