What is Cryptography

Share it:

In the era of information and technology, there are complex of data and to secure and save to your computer or any Storage media is a major challenge in today's worlds.
The techniques used for  Protection of digital data for the unauthorised access and make it private and safe, This process is known as "Cryptography". This technique works with coded messages around it. In computer science, mathematics and electrical engineering applications and methods used are different.
As Computer is everyday needs foe everyone, and to keep the data and information on it not much secure. For the user can use Cryptography process but the  this technique is rarely used.
Occasionally you or your friends around talking to people even take the code and signals, so that no other person can not hear or understand your point. This method of communication is also a form of cryptography. As the conversation when the code is implemented in the computer world, it becomes helpful in keeping data secure. Crypto means code in Greek language.
Today, Cryptography has significance, because the world is changing in the Global Village through computer networks. Cryptography is a major part of computer courses.
Cryptography can be divided into several parts. Eg - Symmetric - the cryptography, and  public - the cryptography. Computer passwords which are used in e-commerce, online banking where key cryptography is used to freeze. With its help messages are written in code, so that a message would be leaked, so unauthorised person could not understand the message.
"Cryptography, Encrypt the plain text so that it is not readable by human. It is simple to hide the information or data, by converting plain text to encrypted text".
User can be very much secure by using this techniques.
There is the Tool name True Crypt. True Crypt is very much powerful and small and very a simple to use.
As this is powerful and very much effective, then also it is available for free. This is just because it is Open Source Software. [Download True Crypt].

Share it:

Learn

Post A Comment:

2 comments:

Follow by Email