Coding & Troubleshooting Tech What is Cryptography? By Kenroy White Posted on January 3, 2019 3 min read 0 Share on Facebook Share on Twitter Share on Linkedin Cryptography involves creating written or generated codes that allow information to be kept secret. Cryptography converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format, thus compromising the data. Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. The pre-fix “crypt” means “hidden” or “vault” and the suffix “graphy” stands for “writing.” In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation and digital signing and verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email. Cryptography techniques Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today’s computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. Modern cryptography concerns itself with the following four objectives: Confidentiality: the information cannot be understood by anyone for whom it was unintended Integrity: the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected Non-repudiation: the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information Authentication: the sender and receiver can confirm each other’s identity and the origin/destination of the information