Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet134/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   130   131   132   133   134   135   136   137   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

Chapter 7:
Cryptography


Have you ever wondered how passwords are stored securely? Or how credit
card information remains private when buying goods online? The answer to
those questions is cryptography. The rate of cyberattacks has increased over
the years, and online companies are not taking chances. Most Internet sites
have incorporated cryptography to protect sensitive information about
clients. Cryptography helps them provide security to users.
Certain information can appear less important but can be used by attackers
to cause great harm. For example, information about an email account is
encrypted to prevent misuse. By now, you are wondering what
cryptography is. Well, cryptography is the process of transmitting
information safely against party access. Many companies swear by
cryptography because it helps them avoid losing information or third-party
interference. People jam into conversations for several reasons. Some do it
to steal information, destroy other people’s reputation, or for financial gain.
Whatever the reason, cryptography help individuals and organizations
evade risks and secure data. There are encryption algorithms used in the
encryption process. The first one is symmetric key encryption, which uses
one common key to lock and unlock the encryption bar. It gives both the
sender and receiver a similar key. The good thing with symmetric key
algorithms is that they are fast because it is not a must for keys to belong.
However, there is a risk when sharing the key because a third-party can
intercept it, and this can compromise the entire system. The fear of
interception is what causes some to shy away from using the symmetric key
encryption.
The other type of encryption algorithm is asymmetric key encryption. In
this algorithm, only the receiver has the key and can choose to send a lock
known as the public key. Asymmetric key encryption works by the receiver
generating two public keys n and e, and one private key d. He then chooses
two large prime numbers q & p, such that n=q*p. 
Another crucial aspect of encryption is signing messages which enable you
to verify senders and avoid sending data to the wrong person. You can sign
a message by creating the signature M, such as T= m^d mod n and then
send T together with the message. Always remember than d is the private
key. Cryptography deals with safeguarding data and communication
strategies. It is the concept of preventing information and communication


from unwanted access by embracing codes with the intention of creating a
safe platform. It is an application to help organizations and individuals
realize secure and safe communication and information processes from
third-party access.

Download 6,34 Mb.
1   ...   130   131   132   133   134   135   136   137   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish