Cryptography - Applications



In real life cryptography plays an important role. Cryptography is just all about keeping our data or messages secure so only the intended person who sends it and the one who is receiving the data or message can understand it. It is mostly about encryption which means changing normal text into cipher text or in encoded form and then changing it back to its normal form when received. Also, cryptography is hiding information in pictures with the help of methods like digital signature or blending it in.

Cryptography is mostly used to make messages secret when we send messages to somebody. Here the simple thing is when we send the message to someone it will get encrypted and when the person receives the message the message will get decrypted so the person can read that message. So this is a very simple and basic example and application of Cryptography. In this tutorial we will see various applications of cryptography and how they use cryptography in our daily lives.

Let us divide the applications as per the cryptography principles - Confidentiality, Integrity, Authenticity and Non-Repudiation −

Confidentiality

As we have already seen what exactly Confidentiality is in the last chapter. So now we will discuss the applications based on it. Basically we need Confidentiality in secure messaging and data encryption. Let us see both the categories one by one.

Secure Messaging/Transmission

Secure messaging means sending messages, emails and files in such a way that it will be received safely without being hacked or modified by the hackers. This is very important as we do not want anyone else to read the private information or see the sensitive information.

Let us see how it works

  • Before sending the messages the message will be encrypted(unreadable text or format). This will be difficult to read by the third party.

  • When the message reaches the authorized recipient they will use their secret key to decrypt(back to original) the message.

  • To make sure only the intended receiver can decrypt the message both the parties will exchange secret keys before sending messages. These keys are like special codes which are used to lock or unlock the messages.

Examples of Secure Messaging

There are two categories for secure messaging: first is end to end encryption and second is email encryption.

  • Messaging apps like WhatsApp, Telegram, Instagram and other messaging apps use end to end encryption. Which means only the intended recipient can read the messages.

  • Services like Pretty Good Privacy(PGP) or Secure/Multipurpose Internet Mail Extensions(S/MIME) encrypt emails. This is done by ensuring only the intended recipient can read them.

Storage/Data Encryption

Data encryption is just like keeping the information in a box which is locked and before sending it via the internet or saving it in the device. It basically keeps our sensitive data secure from hackers.

Let us see how it works

  • First we need to apply an encryption algorithm which is a set of mathematical rules. The algorithm then encodes the data into unrecognizable form.

  • Then we will use a key or password to encrypt and decrypt the data.

  • After that the data will be transformed into ciphertext with the help of encryption algorithm and the encryption key.

  • Lastly, to read the data the ciphertext will be transformed back into plaintext with the help of a decryption key.

Examples

  • BitLocker (for Windows)

  • FileVault (for macOS)

  • Data Encryption in SSL/TLS

By using secure messaging and data encryption, we can communicate and store information online with confidence and our private data will remain private.

Integrity

Now we will discuss Integrity in secure transmission/messaging and secure data storage.

Secure Transmission/Messaging

Some network users are not as concerned about privacy as they are about integrity. In electronic funds transfers, funds transferred from one account to another are usually in the public domain.

If a working tapper can produce fake transfers, money can be distributed illegally. Inaccuracies in individual bits can result in millions of dollars in incorrect credits or debits. Encryption techniques are often used to ensure that intentional or accidental manipulation of data transmissions will not reflect innocent behavior.

Secure Data Storage

The main reason for assuring the integrity of stored data is access control. Access measures include lock and key systems, guards, and other physical or logical measures.

With the recent advent of computer viruses this has changed dramatically, the use of cryptographic checksums to ensure the integrity of encrypted data is becoming more widespread.

Example

Here are some examples of integrity applications in cryptography −

  • Document Verification

  • Software Integrity

  • File Integrity Checking

  • Password Storage

Authenticity

Now we will see applications in which authenticity is a must. Let us see the applications below −

Document Authentication

Digital signatures are mostly used to authenticate the online documents like contracts, agreements, certificates. So when a person sign the document digitally it means that the document is authorised by him. This process prevents unauthorised access and alteration in the document.

Email Authentication

When a person send an email then the mail system uses digital signature to verify the authenticity of the sender. Using the built in functionality sender signs the email with the help of their private key and the receiver can use the sender's public key to verify the signature. This process is required to verify that the email came from the authorised party or sender and it is not altered in transit.

Biometric Authentication

Biometric authentication methods like fingerprint scanners are used to authenticate users as per their unique characteristics. When a person or user scans his fingerprint to unlock a device or to access a system, the system basically verifies the authenticity of identity of the user as per the saved biometric data.

Non-repudiation

Here are some examples of non-repudiation applications in cryptography −

Financial Transactions

In Financial Transactions non Non-Repudiation is very necessary because as we know that non-repudiation means if one person is sent some data then he can not deny that he did not sent that data. In financial transactions these coditions are normal. So if a person deny that he has not received his payment which is sent by the sender.

Both the sender and the receiver can digitally sign transactions records and provide non-repudiation record of the transactoin's authorisation.

Legal Contracts

Digital signatures are mostly used to sign online legal contracts and agreements. With the help of digitally signing a document, the signer cannot later deny their involvement or the terms he is agreed upon. This thing provides assurance to all parties involved and prevents disputes over the authenticity of signatures.

Secure Communication

In email encryption systems that support non-repudiation the sender's identity is authenticated by digital signatures. And it also ensure the integrity of the message. Reciever can verify the digital signature to confirm the sender's identity and prevent repudiation of the message.

Advertisements