{"id":187709,"date":"2024-08-12T15:41:09","date_gmt":"2024-08-12T14:41:09","guid":{"rendered":"https:\/\/liora.io\/en\/?p=187709"},"modified":"2026-02-06T07:56:18","modified_gmt":"2026-02-06T06:56:18","slug":"all-about-cryptography","status":"publish","type":"post","link":"https:\/\/liora.io\/en\/all-about-cryptography","title":{"rendered":"Cryptography: What is it? How does it work?"},"content":{"rendered":"<style><br \/>\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style>We all have the right to privacy&#8230; Whether on a personal or professional level, it is nonetheless reassuring to know that not just anyone can access certain documents we have created or shared. And the science that ensures this protection is cryptography.\n<h3>The origins of cryptography<\/h3>\nCryptography involves mathematically encoding a text to transform it from a readable form to an unintelligible form \u2013 known as an <b>\u201cencrypted\u201d<\/b> text.\n\nCryptography techniques are far from new. They have their origins in the <b>exchange of sensitive information<\/b> among military and political figures or in commerce. As early as the 1st century B.C., Julius Caesar attempted to make his messages indecipherable by shifting each letter three positions in the alphabet.\n\nWhile each era has seen cryptography methods become more refined, a major milestone was reached in 1943 when, under the impetus of mathematician <b>Alan Turing<\/b>, a computer developed at <b>Bletchley Park<\/b> under the direction of the British government was dedicated to this task. Thanks to their computing power, computers are capable of creating extraordinarily complex <b>obfuscation<\/b>.\n\nInitially reserved for the military domain, cryptographic tools have become a <i>sine qua non<\/i> condition for e-commerce and many other internet-related activities. They are used in the <strong>HTTPS protocol<\/strong> that secures websites, financial transactions involving currencies like bitcoin, voice communications, etc.\n\n<style><br \/>\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"900\" height=\"514\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography2.jpg\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography2.jpg 900w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography2-300x171.jpg 300w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography2-768x439.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\">\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\"><div class=\"wp-block-button \"><a class=\"wp-block-button__link wp-element-button \" href=\"\/en\/courses\/data-ai\/\">Discover our courses<\/a><\/div><\/div>\n\n<h3>The principles of encryption<\/h3>\nAn <b>encryption<\/b> <a href=\"https:\/\/liora.io\/en\/algorithm-what-is-it\"><b>algorithm<\/b><\/a> converts a plain message into an <b>encrypted (scrambled) text<\/b>. It relies on advanced mathematics and the use of one or more keys (the equivalent of secret digital signatures, very long sequences of prime numbers).\n\nWhen encrypting a particular content, the key is used to transform the data according to a specific algorithm to hide certain content from prying eyes. The higher the <b>number of bits in the encryption key<\/b>, the more difficult the message will be to decipher.\n\nOnce the message is received, it is decrypted by the recipient and reconverted into a readable form. In both cases \u2013 sending and receiving \u2013 <b>encryption<\/b> and <b>decryption<\/b> are performed using secret &#8220;keys&#8221;.\n\nHowever, several types of approaches are employed, mainly the symmetric and asymmetric modes.\n<h3>Symmetric encryption<\/h3>\n<b>Symmetric encryption<\/b> involves encrypting and decrypting content with a single <b>secret key<\/b> known only to the parties involved. One of the most popular encryptions in this field, especially in the industrial world, is the <b>AES standard<\/b>, which supports <b>128, 192, or 256-bit keys<\/b>. It is often combined with the <b>Galois\/Counter Mode (GCM)<\/b> and thus known as AES-GCM. Although its security is verified, the only issue is that this type of encryption requires all parties involved in a particular message or document to have access to the same shared key.\n<h3>Asymmetric encryption, private and public keys<\/h3>\n<b>Asymmetric encryption<\/b> is more sophisticated. In this context, it is necessary first for each recipient to have a <b>private key<\/b> unique to them, which is an ultra-complex string of numbers that must remain secret at all costs. This encryption scheme uses a second key \u2013 the <b>public key<\/b> \u2013 to encrypt the data, this key being mathematically derived from the <b>private key<\/b>.\n\nThe public key is used to <b>encrypt the message<\/b> but also to identify its author. The <b>signature<\/b> thus generated is attached to the document and sent to the recipient, who is also identified by another public key. However, the recipient will need to use their private key to <b>decrypt the message<\/b>. Anyone attempting to decrypt the message would not be able to do so because they do not have access to this private key. Asymmetric encryption thus avoids both people involved from having to share the same secret key.\n\n<img decoding=\"async\" width=\"900\" height=\"514\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography1.jpg\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography1.jpg 900w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography1-300x171.jpg 300w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2024\/07\/Liora-cryptography1-768x439.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\">\n\n<b>To summarize<\/b>\n\nWith asymmetric encryption, each user has two keys:\n<ul>\n \t<li style=\"font-weight: 400;\" aria-level=\"1\">A private key, which must be kept secret.<\/li>\n \t<li style=\"font-weight: 400;\" aria-level=\"1\">A public key derived from the private key and which can be visible to all.<\/li>\n \t<li style=\"font-weight: 400;\" aria-level=\"1\">The public key is mathematically derived from the private key. However, the reverse process is virtually impossible. In other words, finding the private key from the public key would require tests of an immeasurable duration.<\/li>\n<\/ul>\nA commonly used algorithm is the <b>Rivest-Shamir-Adleman (RSA) function<\/b> with the probabilistic signature scheme (RSA-PSS) and the <b>Digital Signature Algorithm (DSA)<\/b>.\n<h3>Post-quantum cryptography<\/h3>\nAs long as a person&#8217;s private key is not disclosed, <b>data<\/b> and message <b>encryption<\/b> is inviolable. And so far, this mechanism has more than proven itself.\n\nOne question remains: <a href=\"https:\/\/liora.io\/en\/all-about-quantum-computers\">quantum computers<\/a> seem poised to <b>solve mathematical problems unsolvable by classical computers<\/b> and could, in the future, decrypt documents encrypted with asymmetric algorithms such as RSA. This means that sooner or later, we will need to develop <b>new encryption algorithms<\/b> far more advanced than those we use today&#8230;\n\n<a href=\"\/en\/courses\/data-ai\/\">\nFind a course for you\n<\/a>","protected":false},"excerpt":{"rendered":"<p>We all have the right to privacy&#8230; Whether on a personal or professional level, it is nonetheless reassuring to know that not just anyone can access certain documents we have created or shared. And the science that ensures this protection is cryptography. The origins of cryptography Cryptography involves mathematically encoding a text to transform it [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":187711,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_acf_changed":false,"editor_notices":[],"footnotes":""},"categories":[2426],"class_list":["post-187709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"_links":{"self":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/187709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/comments?post=187709"}],"version-history":[{"count":1,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/187709\/revisions"}],"predecessor-version":[{"id":205679,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/187709\/revisions\/205679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media\/187711"}],"wp:attachment":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media?parent=187709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/categories?post=187709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}