Demystifying Cryptography: A Key Pillar in Cybersecurity

August 16, 2025 • 32 views • Case Studies 3 min read

Cryptography, the method of protecting information by transforming it into an unreadable format, is crucial to securing digital transactions. It not only protects data from theft or alteration, but also enables user authentication, combining the fields of mathematics, computer science, and electr...

Table of Contents

In a world where digital transactions have become the norm rather than the exception, securing these transactions is paramount. This is where cryptography comes in. At its core, cryptography is a method of protecting information by transforming it into an unreadable format. Only those who possess a special key can decipher these cryptic messages. This blog post will dive deep into the world of cryptography, explaining its importance, how it works, and practical applications.

An Overview of Cryptography

Cryptography, derived from the Greek words 'kryptos' and 'graphia', which mean 'hidden' and 'writing', respectively, is the practice and study of secure communication techniques in the presence of third parties. It involves creating written or generated codes that allow information to be kept secret.

Cryptography not only protects data from theft or alteration but can also be used for user authentication. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering.

Types of Cryptography

There are primarily three types of cryptographic techniques:

  1. Symmetric-key Cryptography: Both the sender and receiver share a single key in this method. The sender uses this key to encrypt the plaintext and send the cipher text to the receiver. Upon receiving the cipher text, the receiver applies the same key to decrypt the message and retrieve the plaintext.

  2. Public Key Cryptography: This technique uses two mathematically linked, but not identical, keys - a public key and a private key. The public key is used for encryption and the private key is used for decryption.

  3. Hash Functions: No key is used in this method. A fixed-length hash value is computed based on the plaintext making it impossible to retrieve the original message.

Cryptography in Action – Case Studies

Case Study 1: Secure Online Transactions

Online transactions would not be secure without cryptography. When you make a purchase online, your credit card information is encrypted using a method known as Secure Socket Layer (SSL) or Transport Layer Security (TLS). This encrypted data is then sent to the server where it is decrypted using a unique key.

Here is a simplified example of SSL/TLS encryption:

import OpenSSL

# Create a new OpenSSL context
context = OpenSSL.SSL.Context(OpenSSL.SSL.TLSv1_2_METHOD)

# Load the server's certificate and private key
context.use_certificate_file('server.crt')
context.use_privatekey_file('server.key')

# Load the client's CA certificate
context.load_verify_locations('client.crt')

This is a very basic example. In reality, the encryption process is much more complex and secure.

Case Study 2: Password Storage

Most online services store user passwords in an encrypted format using hash functions. When a user creates a password, the service will hash the password and store the hash value. When the user logs in, the password they enter is hashed again and the hash value is compared with the stored hash value. If the values match, the password is correct.

Here is a simple example of password hashing using the SHA-256 algorithm:

import hashlib

password = "my_password"
hash_object = hashlib.sha256(password.encode())
hex_dig = hash_object.hexdigest()

print(hex_dig)

This process ensures that even if a hacker gains access to the database, they cannot decipher the user passwords.

Conclusion

Cryptography plays an integral part in providing data security and integrity for various applications, from secure online transactions to password storage. As we move towards an increasingly digital world, the importance of cryptography in protecting sensitive information will only continue to grow.

While cryptography is a complex field that requires a strong understanding of mathematics and computer science, its basic principles and applications can be understood by anyone interested in cybersecurity. As demonstrated in the case studies, practical applications of cryptography help secure our everyday digital interactions, making it a crucial component of modern cybersecurity.

Remember, in the realm of cybersecurity, knowledge is your best defence. Understanding how cryptography works is a significant step towards safeguarding your digital activities.