are extremely useful functions that appear in many information security

applications called the hash functions. We discuss the use of hash functions

in blockchain, hash function security for blockchain, and types of hash

functions. We explain that a credential of establishing whether a public key

belongs to the intended owner is done by the digital certificate and know

how to obtain a digital certificate.

After reading this chapter, you will be able to understand the basics of

algorithms and how they are used in cryptography, identify the differences

between asymmetric and symmetric algorithms, understand concepts of

cryptography, and how they relate to network security.

Introducing cryptography

The method of securing messages/ information and communication through

wires by using codes so that only those for whom the message/ information

is intended can read and process it. The words “hidden” or “vault” stand for

crypt” and the word “writing” stands for “graphy”.

The mathematical concepts, protocols, rule-based calculations called

algorithms are used to transform messages that are hard to decipher and

secure messages/ information and communication by cryptography in

computer science. For digital signing, protecting data privacy, Internet Web

browsing, verification of cryptographic key generation, and confidential

communications such as credit/ debit card transactions and e-mail, these

algorithms are used, which are deterministic in nature.

A cipher is a cryptographic algorithm, a mathematical function used by the

encryption and decryption process.

A key which may be a word, a number, or a phrase, is used to encrypt the

plaintext, and it works in combination with a cryptographic algorithm.

The same plaintext encrypts to different ciphertext with different keys.

The following figure shows cryptography at work: