|
1 | 1 | # Encryption-and-Decryption-using-Python
|
2 |
| -What is Encryption and decryption and how do we do it using Python. |
| 2 | +I recently learned about cryptography and several encryption and decryption algorithms using Python. Here is the code for the simplest "Encryption Decryption" little project. The main goal of this project is to learn how to implement various algorithms in Python; nevertheless, there are many better and stronger techniques than this code. |
| 3 | + |
| 4 | +## Outline |
| 5 | +* [Cryptography](#cryptography) |
| 6 | +* [Terminologies in Cryptography](#terminologies-in-cryptography) |
| 7 | + - [Plain Text](#plain-text) |
| 8 | + - [Cipher Text](#cipher-text) |
| 9 | + - [Encryption](#encryption) |
| 10 | + - [Symmetric Encryption](#symmetric-encryption) |
| 11 | + - [Asymmetric Encryption](#asymmetric-encryption) |
| 12 | + - [Hashing](#hashing) |
| 13 | + - [Decryption](#decryption) |
| 14 | + |
| 15 | +## Cryptography |
| 16 | + |
| 17 | +Cryptography is defined as the art and science of concealing the message to introduce privacy and secrecy as recognized in information security. |
| 18 | + |
| 19 | +Cryptography is traditionally used to hide messages from the eyes of certain users. Today, this use has an even greater advantage since communications via the Internet circulate in infrastructures whose reliability and confidentiality cannot be guaranteed. Cryptography is now used not only to protect the confidentiality of data but also to guarantee its integrity and authenticity. |
| 20 | + |
| 21 | +## Terminologies in Cryptography |
| 22 | +### Plain Text |
| 23 | +The plain text message is the text which is readable and can be understood by all users. The plain text is the message which undergoes cryptography. |
| 24 | + |
| 25 | +### Cipher Text |
| 26 | +Cipher text is the message obtained after applying cryptography on plain text. |
| 27 | + |
| 28 | +### Encryption |
| 29 | +Encryption is the process of encoding the data. i.e converting plain text into ciphertext. This conversion is done with a key called an encryption key. |
| 30 | + |
| 31 | +There are several data encryption approaches available to choose from. |
| 32 | + |
| 33 | +#### Symmetric Encryption |
| 34 | +Also called private-key cryptography or a secret key algorithm, this method requires the sender and the receiver to have access to the same key. So, the recipient needs to have the key before the message is decrypted. This method works best for closed systems, which have less risk of a third-party intrusion. |
| 35 | + |
| 36 | +#### Asymmetric Encryption |
| 37 | +Also called public-key cryptography, this method uses two keys for the encryption process, a public and a private key, which are mathematically linked. The user employs one key for encryption and the other for decryption, though it doesn’t matter which you choose first. |
| 38 | + |
| 39 | +#### Hashing |
| 40 | +Hashing generates a unique signature of fixed length for a data set or message. Each specific message has its unique hash, making minor changes to the information easily trackable. Data encrypted with hashing cannot be deciphered or reversed back into its original form. That’s why hashing is used only as a method of verifying data. |
| 41 | + |
| 42 | +### Decryption |
| 43 | +Decryption is a process of decoding the encoded data. Converting the ciphertext into plain text. This process requires a key that we used for encryption. |
| 44 | + |
| 45 | +## Installation |
| 46 | + |
0 commit comments