Cryptography : Key Based Cryptographic Algorithms
Technique Based Cryptographic Algorithms and their working mechanisms. In this
blog, I will be discussing about Key Based Cryptographic Algorithms. Key based
algorithms are fairly harder than the Technique based algorithms. These involve
more complex concepts that make these algorithms far more secure than Technique
classification of the algorithms that categorize into parts :
plain text and then one by one character is processed at a time.
the algorithm demonstrations.
In this type of cryptography, only one key is used and the same key is used to encrypt
and decrypt the message. Both parties must agree upon the same key before any
transmission begins. This key should be only known to the two parties and no one else.
That’s why it is also called as Private Key Cryptography or Secret Key Cryptography.
Example – DES, IDEA, RC4, RC5, BlowFish, AES, etc.
In this type of cryptography, two different keys are used – one is public key which is
available to all for encrypting the message and the other one is private key which is
available only to the receiver for decrypting the message. Both the keys are generated
by the receiver but only the public key is sent to the sender for encryption. Any sender
can encrypt the message with the public key but only receiver can decrypt the message
with the private key. This feature ensures that only the intended person can only read
the message and no one else. That’s why it is also called Public Key Cryptography.
Example – Merkle’s Puzzles, RSA, ElGamal, ECC, etc.
Algorithms. That’s all for this blog.