Saturday, January 2, 2016

Cryptography Basic Understand

Cryptography  Basic Understand 

Cryptography provides three main purposes: confidentiality, data integrity, and authentication. Confidentiality means that data is hidden from ill-intentioned, or simply too curious, eyes.
Data integrity aviods tampering with the data, whereas authentication consists in verifying the identity of the sender to ensure that he or she is exactly who they do that they areCryptography serves four main categories of functions:
symmetric algorithms, asymmetric algorithm, signatures, and hash algorithms.
Symmetric algorithms perform a transformation on data, camouflaging its real contents. In doing so, it employs a single secret key to both encrypt and decrypt data. Each individual who gets the key can decrypt any file encrypted with the same key.
Asymmetric algorithms use a pair of keys, known as public/private keys. Anyone can use a public key to encrypt data. Only a particular private key, though, can decrypt that content. To set up a public key encryption, you must use a pair of public and private keys that are mathematically linked. Once you obtain a pair of keys, you keep the private key for yourself and distribute the public key to anyone that needs to send data to you. The algorithm is said to be asymmetric because two different keys are involved—one to encrypt and one to decrypt.
A digital signature is designed to ensure that any received data originates from a specific user. A digital signature is a block of data that is unique to a party.
You can use cryptography to encrypt and decrypt disk files as well as dynamically and transparently scramble data traveling over network channels. In doing so, you make potentially unsecure channels inherently more secure, thus providing data integrity and authentication.The .NET Framework's cryptographic classes are used to manage many details of cryptography for you so you donnot have to be an algorithm expert or a mathematician. Some of .NET's cryptographic classes are simply wrappers for the Win32 CryptoAPI set of libraries, while others are made of pure managed code. You can encrypt data using symmetric and asymmetric algorithms. For symmetric algorithms in particular—probably the most common case in end user applications—.NET provides an extremely handy facility called the CryptoStream class. We used this cryptographic for user login password and information and as wellas few dataset\crystal report files to prevent user for modifications and reading data. For key management it Supported multiple encryption standards and Centralize user profiles for authentication and access to keys and record comprehensive logs and audit trails