Videos

Published on July 5th, 2019 📆 | 2497 Views ⚑

0

What Is Cryptography?


Convert Text to Speech


Cryptography

Is the science of writing codes and ciphers using mathematics to hide information from unauthorized people. When you make a secure financial transaction on the web or give your password to an email program, your data will be encrypted so that anyone who is lurking around and trying to get that information for malicious purposes can’t do so. This process has been used since ancient times allowing people to communicate and transmit information in a secure manner.

The incredibly long and fascinating history of cryptography developments is what has led up to the advanced and sophisticated methods used today in the modern digital encryption behind CRYPTOCURRENCIES and BLOCKCHAINS. The most basic form of cryptography is called “Symbol replacement”. It appears in both ancient Egyptian and Mesopotamian writing that has been adopted by the Greeks and the Romans.

Cryptography Applications:

Secure communications
The main use of cryptography is encrypting communication between us and another system. This is most commonly used for communicating between a client program and a server. Examples are a web browser and web server, or email client and email server.





End-to-end Encryption

End-to-end encryption (E2EE) is a method of secure communication that prevents third-parties from accessing data while it's transferred from one end system or device to another.
In E2EE, the data is encrypted on the sender's system or device and only the recipient is able to decrypt it. Nobody in between, be they an Internet service provider, application service provider or hacker, can read it or tamper with it.

Storing Passwords
One of the main uses of this is to store passwords. It is very risky to store passwords in an accessible way. If stored in plaintext on a system, anyone who has access to the system – legitimate or malicious – can read the password. Encryption is only a partial answer to storing passwords. If someone has access to the system storing the encrypted passwords, they will probably have access to the encryption key to decrypt the password.

Blockchain and CryptoCurrency
Will be explained in the next series of videos.

video, sharing, camera phone, video phone, free, upload
2019-07-05 10:28:59

source

Tagged with:



Comments are closed.