Cryptography can be defined as the process of making information indecipherable to all except those who are the intended recipients of such information. In this day of electronic communication via the Internet, particularly electronic commerce, securing sensitive data (such as credit card numbers and e-mail) is becoming increasingly important. Through various methods of cryptography, data can be safely transmitted without the threat of the information being intercepted and, subsequently, compromised.
The prime benefit of using cryptography is that virtually all processes, transactions and communications that can be performed in person can also be safely performed in the electronic world - with the benefit of circumventing the inherent problems of distance and time. With the ever-increasing worldwide usage of the Internet for commerce and communication, cryptography virtually eliminates any concerns individuals may have previously had relating to privacy and fraud.
information that you do not want any party other than the intended recipient to
view should be encrypted. When you consider that the connection between you and
any other point on the Internet can be routed through literally dozens of
different systems, and messages that pass through those systems can be easily
intercepted and read, encryption becomes a necessity for sensitive information.
unencrypted message sent over the Internet is analogous to sending a postcard
through the mail; encryption provides an envelope for your message to prohibit
the following: anyone�from a network administrator to your little sister�has
the ability to read your e-mail. You certainly wouldn't want anyone to intercept
your e-mail messages, whether they are vital company secrets or love letters.
Without any kind of encryption, any e-mail message you send is only as secure as
sending a postcard.
are two types of cryptosystems: secret key (also known as symmetric key
encryption), where a single key is used for both encryption and decryption, and
Public Key (also known as asymmetric encryption), where each user has a Public
Key and a Private Key. The most popular secret-key cryptosystem in use today is
known as DES, the Data Encryption Standard.
Public Key cryptography, the Public Key, as the name implies, is made public
while the Private Key remains secret. Encryption is performed with the Public
Key while decryption is done with the Private Key. The RSA Public Key
cryptosystem (named after Rivest, Shamir, and Adleman who developed RSA) is the
most popular form of Public Key cryptography.
Public Key cyptosystems include ECDSA (Elliptic Curve Digital Signature
Algorithm), DSA (the
Digital Signature Algorithm) and the Diffie-Hellman key agreement protocol.
Privacy is simply preventing the unauthorized reading of or access to data�exactly what cryptography accomplishes. By encrypting information that is intended to remain private, data can be safely sent to only those people who have the permission and ability to decrypt the information.
by RSA Laboratories, the Public Key Cryptography Standards (PKCS) are a
recognized set of protocols established for asymmetric (Public Key)
than attempting to know and understand what the functions of the various
standards are, the more important concept is that the PKCS were established, and
continue to be developed, to facilitate interoperability among Public Key
more and more people send confidential information via e-mail, it is becoming
increasingly important to know that your messages cannot be intercepted and read
by anyone other than the intended recipient. It is equally important to know
that sensitive documents sent by e-mail cannot be forged.
By using IDRBT CA's Digital certificates, you can prove your identity in electronic transactions, similar to showing your driver's license when you cash a cheque. You can also use your digital certificate to encrypt messages to keep them private. Digital certificates incorporate the S/MIME specification for secure electronic mail.