Base64 Algorithm

Image
  Introduction              -----> Base64 encoding is used to c onvert binary data into a text-like format that allows it to be transported in environments that can handle only text safely.               -----> Base64 is sometimes also refered to as PEM , which stands for Privacy-enhanced Electronic Mail . There, Base64 was used to create printable text again after binary e-mail data that was generated during the e-mail encryption process.   How it works               Base64 encoding takes the original binary data and operates on it by dividing it into tokens of three bytes . A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard.  The first step is to take the three bytes (24bit) of binary data and split it into f our numbers of six bits . Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensur

Encryption And Decryption

Encryption And Decryption

 

# Encryption is the process of converting normal message (plaintext) into meaningless message (Ciphertext).


 # Decryption is the process of converting meaningless message (Ciphertext) into its original form (Plaintext).


  


 

     Types of encryption



CRYPTOGRAPHY

Encryption algorithm

 An encryption algorithm along with a key is used in the encryption and decryption of data. There are several types of data encryptions which form the basis of network security. Encryption schemes are based on block or stream ciphers.

 

Encryption key.

         A sequence of values that are used with a cipher algorithm to encrypt a message. The choice of random (or cryptographically pseudorandom) keys, a secure key exchange mechanism, frequent key refreshments, and good secrecy protection of keys are all essential ingredients for the security of the integrity verification mechanism.

 

Asymmetric encryption algorithm.


 

  modern branch of cryptography. also known as public-key cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm.


Symmetric encryption algorithm.

Symmetric vs. Asymmetric Encryption | 101 Computing

 

           The encryption key and the decryption key are interrelated and may even be the same.



 

Private key.

      The secret component of a pair of cryptographic keys used for asymmetric cryptography. In a public key cryptosystem that key of a user's key pair which is known only by that user.


Public key

      A public key which encrypts a message. (RFC 2828) The publicly-discloseable component of a pair of cryptographic keys used for asymmetric cryptography. In a public key cryptosystem, that key of a user's key pair which is publicly known.

Public key encryption.

            An encryption mechanism where two keys are used. A public key is used to encrypt the message and a secret private key to decrypt the message.

 

Comments

Popular posts from this blog

Base64 Algorithm

Linux termux 2.0

Operating System used by Hackers

Social