NAME:- ADAMU SALAHA YUSUF
REG NO:- MIU/23/CMP/CYB/159
COURSE:- CRYPTOGRAPHIC TECHNIQUES
DATE:- 16/09/2025
1. Define the term Cryptography
Cryptography is a method of protecting information and communications using codes, so that only
those for whom the information is intended can read and process it. In computer science,
cryptography refers to secure information and communication techniques derived from
mathematical concepts and a set of rule-based calculations called algorithms, to transform
messages in ways that are hard to decipher. These deterministic algorithms are used for
cryptographic key generation, digital signing, verification to protect data privacy, web browsing on
the internet and confidential communications such as credit card transactions and email.
Key points about cryptography:
• Encryption: Changing readable data (plaintext) into unreadable form (ciphertext) using a secret
key.
• Decryption: Converting ciphertext back into readable data using the correct key.
• Keys and algorithm.
2. What role does it play in data security?
Cryptography plays a fundamental role in data security by ensuring confidentiality, integrity, and
authentication of information through methods like encryption, hashing, and digital signatures. It
transforms data into an unreadable format to prevent unauthorized access (confidentiality), detects
unauthorized changes to data (integrity), and verifies the identities of users or systems
(authentication). Cryptography is essential for secure online communication, financial transactions,
and protecting sensitive data in storage and transit.
1. Confidentiality
• Ensures that only authorized people can access sensitive information.
• Example: When you shop online, your credit card details are encrypted so hackers can’t steal
them.
2. Integrity
• Protects data from being modified without detection.
• Cryptographic checks like hash functions verify that data hasn’t been tampered with.
• Example: Software updates are digitally signed to confirm they haven’t been altered.
3. Authentication
• Verifies the identity of users, devices, or systems.
• Digital certificates and cryptographic keys confirm that you’re talking to the right website or
person.
• Example: HTTPS uses SSL/TLS certificates to prove you’re connected to the real site, not a
fake one.
4. Non-repudiation ■■
• Prevents people from denying their actions.
• Digital signatures prove that a specific person sent a message or approved a transaction.
• Example: In online contracts, cryptographic signatures ensure accountability.