Monthly Archives: October 2018

The New Era of Crypto Works for You Now

In the 21st century, cryptography plays a significant role in the digital life of modern people. Let us briefly consider methods of encryption of information.

Cryptography is not just a computer thing

Most likely, you have already encountered the simplest cryptography and, probably, you know some methods of encryption. For example, Caesar’s Cipher is often used in developing children’s games.ROT13 is another common type of message encryption. In it, each letter of the alphabet is shifted by 13 positions, as shown in the figure:


As you can see, this code does not provide reliable information protection: it is a simple and understandable example of the whole idea of ​​cryptography.

Today we are talking about cryptography most often in the context of some technology. How is personal and financial information safely transferred when we make a purchase on the Internet or look through bank accounts? How can you securely store data so that no one can open the computer, pull out the hard drive and have full access to all the information on it? We will answer these and other questions in this article. If you need to know more, then you can visit now.

Definitions and a short guide to cybersecurity

Confidentiality – data cannot be received or read by unauthorised users.

The integrity of information –This is the belief that the information will remain 100% untouched and will not be changed by the attacker.

Accessibility of information – access to data when necessary

Also in the article, we will consider various forms of digital cryptography and how they can help achieve the goals listed above.

Basic encryption methods:

  • Symmetrically
  • Asymmetric
  • Hashing
  • Digital signature
  • Symmetric Encryption

Before we begin to understand the topic, we answer the simple question: what exactly is meant by “encryption”? Encryption is the conversion of information for purposes of concealment from unauthorised persons, but at the same time granting authorised users access to it.

Note that the variable datatoencrypt, which was initially the string “now you can read me!”, Now has a bunch of incomprehensible symbols. Let’s reverse the process using the key that was initially stored in the key variable.After using the same key that we set for encryption, we decrypt the message and get the original string.Let’s look at other way of encryption.


The problem of symmetric encryption is as follows: suppose you need to send some data via the Internet. If you need the same key to encrypt and decrypt data, you must first submit the key. This means that you will need to send the core through an insecure connection. However, so the key can be intercepted and used by a third party. To avoid such an outcome, they invented asymmetric encryption.