- Cryptography Tutorial
- Cryptography - Home
- Cryptography - Origin
- Cryptography - History
- Cryptography - Principles
- Cryptography - Applications
- Cryptography - Benefits & Drawbacks
- Cryptography - Modern Age
- Cryptography - Traditional Ciphers
- Cryptography - Need for Encryption
- Cryptography - Double Strength Encryption
- Cryptosystems
- Cryptosystems
- Cryptosystems - Components
- Attacks On Cryptosystem
- Cryptosystems - Rainbow table attack
- Cryptosystems - Dictionary attack
- Cryptosystems - Brute force attack
- Cryptosystems - Cryptanalysis Techniques
- Types of Cryptography
- Cryptosystems - Types
- Public Key Encryption
- Modern Symmetric Key Encryption
- Cryptography Hash functions
- Key Management
- Cryptosystems - Key Generation
- Cryptosystems - Key Storage
- Cryptosystems - Key Distribution
- Cryptosystems - Key Revocation
- Block Ciphers
- Cryptosystems - Stream Cipher
- Cryptography - Block Cipher
- Cryptography - Feistel Block Cipher
- Block Cipher Modes of Operation
- Electronic Code Book (ECB) Mode
- Cipher Block Chaining (CBC) Mode
- Cipher Feedback (CFB) Mode
- Output Feedback (OFB) Mode
- Counter (CTR) Mode
- Symmetric Algorithms
- Data Encryption Standard
- Triple DES
- Advanced Encryption Standard
- Data Integrity in Cryptography
- Data Integrity in Cryptography
- Message Authentication
- Cryptography Digital signatures
- Public Key Infrastructure
- Cryptography Useful Resources
- Cryptography - Quick Guide
- Cryptography - Discussion
Cryptography - Applications
In real life cryptography plays an important role. Cryptography is just all about keeping our data or messages secure so only the intended person who sends it and the one who is receiving the data or message can understand it. It is mostly about encryption which means changing normal text into cipher text or in encoded form and then changing it back to its normal form when received. Also, cryptography is hiding information in pictures with the help of methods like digital signature or blending it in.
Cryptography is mostly used to make messages secret when we send messages to somebody. Here the simple thing is when we send the message to someone it will get encrypted and when the person receives the message the message will get decrypted so the person can read that message. So this is a very simple and basic example and application of Cryptography. In this tutorial we will see various applications of cryptography and how they use cryptography in our daily lives.
Let us divide the applications as per the cryptography principles - Confidentiality, Integrity, Authenticity and Non-Repudiation −
Confidentiality
As we have already seen what exactly Confidentiality is in the last chapter. So now we will discuss the applications based on it. Basically we need Confidentiality in secure messaging and data encryption. Let us see both the categories one by one.
Secure Messaging/Transmission
Secure messaging means sending messages, emails and files in such a way that it will be received safely without being hacked or modified by the hackers. This is very important as we do not want anyone else to read the private information or see the sensitive information.
Let us see how it works
Before sending the messages the message will be encrypted(unreadable text or format). This will be difficult to read by the third party.
When the message reaches the authorized recipient they will use their secret key to decrypt(back to original) the message.
To make sure only the intended receiver can decrypt the message both the parties will exchange secret keys before sending messages. These keys are like special codes which are used to lock or unlock the messages.
Examples of Secure Messaging
There are two categories for secure messaging: first is end to end encryption and second is email encryption.
Messaging apps like WhatsApp, Telegram, Instagram and other messaging apps use end to end encryption. Which means only the intended recipient can read the messages.
Services like Pretty Good Privacy(PGP) or Secure/Multipurpose Internet Mail Extensions(S/MIME) encrypt emails. This is done by ensuring only the intended recipient can read them.
Storage/Data Encryption
Data encryption is just like keeping the information in a box which is locked and before sending it via the internet or saving it in the device. It basically keeps our sensitive data secure from hackers.
Let us see how it works
First we need to apply an encryption algorithm which is a set of mathematical rules. The algorithm then encodes the data into unrecognizable form.
Then we will use a key or password to encrypt and decrypt the data.
After that the data will be transformed into ciphertext with the help of encryption algorithm and the encryption key.
Lastly, to read the data the ciphertext will be transformed back into plaintext with the help of a decryption key.
Examples
BitLocker (for Windows)
FileVault (for macOS)
Data Encryption in SSL/TLS
By using secure messaging and data encryption, we can communicate and store information online with confidence and our private data will remain private.
Integrity
Now we will discuss Integrity in secure transmission/messaging and secure data storage.
Secure Transmission/Messaging
Some network users are not as concerned about privacy as they are about integrity. In electronic funds transfers, funds transferred from one account to another are usually in the public domain.
If a working tapper can produce fake transfers, money can be distributed illegally. Inaccuracies in individual bits can result in millions of dollars in incorrect credits or debits. Encryption techniques are often used to ensure that intentional or accidental manipulation of data transmissions will not reflect innocent behavior.
Secure Data Storage
The main reason for assuring the integrity of stored data is access control. Access measures include lock and key systems, guards, and other physical or logical measures.
With the recent advent of computer viruses this has changed dramatically, the use of cryptographic checksums to ensure the integrity of encrypted data is becoming more widespread.
Example
Here are some examples of integrity applications in cryptography −
Document Verification
Software Integrity
File Integrity Checking
Password Storage
Authenticity
Now we will see applications in which authenticity is a must. Let us see the applications below −
Document Authentication
Digital signatures are mostly used to authenticate the online documents like contracts, agreements, certificates. So when a person sign the document digitally it means that the document is authorised by him. This process prevents unauthorised access and alteration in the document.
Email Authentication
When a person send an email then the mail system uses digital signature to verify the authenticity of the sender. Using the built in functionality sender signs the email with the help of their private key and the receiver can use the sender's public key to verify the signature. This process is required to verify that the email came from the authorised party or sender and it is not altered in transit.
Biometric Authentication
Biometric authentication methods like fingerprint scanners are used to authenticate users as per their unique characteristics. When a person or user scans his fingerprint to unlock a device or to access a system, the system basically verifies the authenticity of identity of the user as per the saved biometric data.
Non-repudiation
Here are some examples of non-repudiation applications in cryptography −
Financial Transactions
In Financial Transactions non Non-Repudiation is very necessary because as we know that non-repudiation means if one person is sent some data then he can not deny that he did not sent that data. In financial transactions these coditions are normal. So if a person deny that he has not received his payment which is sent by the sender.
Both the sender and the receiver can digitally sign transactions records and provide non-repudiation record of the transactoin's authorisation.
Legal Contracts
Digital signatures are mostly used to sign online legal contracts and agreements. With the help of digitally signing a document, the signer cannot later deny their involvement or the terms he is agreed upon. This thing provides assurance to all parties involved and prevents disputes over the authenticity of signatures.
Secure Communication
In email encryption systems that support non-repudiation the sender's identity is authenticated by digital signatures. And it also ensure the integrity of the message. Reciever can verify the digital signature to confirm the sender's identity and prevent repudiation of the message.
To Continue Learning Please Login
Login with Google