Universidad de Granada

ReiDoCrea

Artículo número 24

Learning the basics of cryptography with practical examples

Shab E Noor – Universidad de Granada - ORCID

Ali Ahmad – Universidad de Granada - ORCID

Vanessa Martos Núñez - Universidad de Granada - ORCID

Miguel J. Hornos Barranco – Universidad de Granada - ORCID

Abstract

Cryptography is a secure technique of data communication and exchange that relies on encryption and decryption protocols. This technique is in use since many centuries. Nonetheless, in today’s world, it supports data protection and privacy while ensuring the authenticity and confidentiality of the data. E-commerce, banking, military, and corporations are the prominent operators of this technology, although it is, directly or indirectly, linked to almost every single person nowadays. Symmetric and asymmetric key cryptography are the two fundamental forms of cryptography. Asymmetric key cryptography is more secure than symmetric but at the cost of greater computational complexity. The use of hash functions and digital signatures also contribute to the security of systems and the privacy of information. This article presents the basic differences between the fundamental types of cryptography as well as practical examples of encrypting information using various cipher systems, which will help to understand them. This is an introductory article that is primarily aimed at undergraduate students in the area of computer science, in order to enrich their understanding of the field.

Keyword: FDigital Signature

Referencias

1. Arslanian H, Fischer F. The Basics of Cryptography and Encryption. The Future of Finance: Springer; 2019. p. 89-93.

2. Rajanbabu DT, Raj C, editors. Implementing a reliable cryptography based security tool for communication networks. 2014 International Conference on Science Engineering and Management Research (ICSEMR); 2014: IEEE.

3. Maqsood F, Ahmed M, Mumtaz M, Ali M. Cryptography: a comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications. 2017;8(6):442-8.

4. Burniske C, Tatar J. Cryptoassets: The innovative investor's guide to bitcoin and beyond: McGraw-Hill Education New York; 2018.

5. Martin K. Cryptography: The key to digital security, how it works, and why it matters: WW Norton & Company; 2020.

6. Delfs H, Knebl H. Introduction to Cryptography Principles and Applications (2007). Springer.

7. Delfs H, Knebl H, Knebl H. Introduction to cryptography: Springer; 2002.

8. Chandra S, Paira S, Alam SS, Sanyal G, editors. A comparative survey of symmetric and asymmetric key cryptography. 2014 international conference on electronics, communication and computational engineering (ICECCE); 2014: IEEE.

9. McKenzie BJ, Harries R, Bell T. Selecting a hashing algorithm. Software: Practice and Experience. 1990;20(2):209-24.

10. Katz J, Lindell Y. Introduction to modern cryptography: CRC press; 2020.

11. Gaines HF. Cryptanalysis: A study of ciphers and their solution: Courier Corporation; 2014.

12. Arroyo JCT, Dumdumaya CE, Delima AJP. Polybius Square in Cryptography: A Brief Review of Literature. International Journal. 2020;9(3).

13. Bhatt AP, Sharma A. Quantum cryptography for internet of things security. Journal of Electronic Science and Technology. 2019;17(3):213-20.

14. Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Reviews of modern physics. 2002;74(1):145.