Cryptography is a technique to allow protect documents and data. It works through the use of numbers or codes, which allows us to hide secret information and data in government documents, business or even home, so that they can move without being able to be read by anyone except those people that knows the specific key.
Its use is as old as writing. The Romans used the cryptography codes to conceal their war plans of those people who should not know these plans. To decrypt the encrypted content of these documents, the person must read must know the key to decipher the hidden content.
From the evolution of computers, cryptography was widely publicized, used and modified, and then established with mathematical algorithms. In addition to maintaining user security, cryptography preserves the integrity of the web, user authentication as well as the sender, recipient and present the message or access.
The keys can be:
Symmetrical: The use of certain algorithms to decrypt and encrypt (hide) documents. They are groups of different algorithms that relate to each other to keep confidential information connection.
Asymmetrical: It is a mathematical formula that uses two keys, one public and one private. The public key is the one to which anyone can access, while the private key is one that only the person who receives it is able to decipher.
If you liked this page, you can share…