{"id":383,"date":"2026-02-11T02:09:48","date_gmt":"2026-02-11T02:09:48","guid":{"rendered":"https:\/\/wordpress.sciencepicker.com\/?p=383"},"modified":"2026-02-11T02:09:48","modified_gmt":"2026-02-11T02:09:48","slug":"know-about-cryptography","status":"publish","type":"post","link":"https:\/\/www.science-pickers.com\/know-about-cryptography\/","title":{"rendered":"Know about cryptography"},"content":{"rendered":"\n<p><strong>Since ancient times, many people have relied on cryptography. Cryptography is the art of writing and solving coded messages to keep the secrets safe and secure. During the 5<sup>th<\/sup> century, messages were inscribed on a material made up of leather or paper and delivered by a human messenger. Nowadays, ciphers help secure our digital data as it zips through the internet. In the future, this may take another leap. While\u00a0quantum computers\u00a0are on the horizon, cryptographers are going around the power of physics to generate the most secure ciphers today.<\/strong><\/p>\n\n\n\n<p><strong>Historic Methods <\/strong><\/p>\n\n\n\n<p><strong>Cryptography<\/strong> is a word which is derived from the Greek words\n&#8220;Kryptos,&#8221; which means hidden, and &#8220;graphein,&#8221; which means\nto write. Instead of hiding or protecting a message physically from the enemy\u2019s\nsight. <strong>Cryptography<\/strong> allows two parties to communicate in plain sight but\nin a language that any opposition party can\u2019t read or understand.<\/p>\n\n\n\n<p>To encrypt a message, the sender must manipulate the content using some algorithm. The original message may be scrambled so that its letters might be replaced with another. The resulting gibberish is known as\u00a0ciphertext, according to\u00a0Crash Course Computer Science.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"800\" height=\"872\" src=\"https:\/\/wordpress.sciencepicker.com\/wp-content\/uploads\/sites\/136\/Cryptography-machine.jpg\" alt=\"\" class=\"wp-image-385\" srcset=\"https:\/\/www.science-pickers.com\/wp-content\/blogs.dir\/1\/uploads\/sites\/182\/Cryptography-machine.jpg 800w, https:\/\/www.science-pickers.com\/wp-content\/blogs.dir\/1\/uploads\/sites\/182\/Cryptography-machine-275x300.jpg 275w, https:\/\/www.science-pickers.com\/wp-content\/blogs.dir\/1\/uploads\/sites\/182\/Cryptography-machine-768x837.jpg 768w, https:\/\/www.science-pickers.com\/wp-content\/blogs.dir\/1\/uploads\/sites\/182\/Cryptography-machine-40x45.jpg 40w, https:\/\/www.science-pickers.com\/wp-content\/blogs.dir\/1\/uploads\/sites\/182\/Cryptography-machine-450x491.jpg 450w, https:\/\/www.science-pickers.com\/wp-content\/blogs.dir\/1\/uploads\/sites\/182\/Cryptography-machine-30x33.jpg 30w, https:\/\/www.science-pickers.com\/wp-content\/blogs.dir\/1\/uploads\/sites\/182\/Cryptography-machine-780x850.jpg 780w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Cryptography\nin the age of the internet<\/h2>\n\n\n\n<p>The goal of <strong>cryptography<\/strong> in the digital era remains the same i.e. to prevent information exchanged between two parties being taken away by an opponent. Computer experts often refer to the two parties with the name, &#8220;Alice and Bob.\u201d These two names were the fictional entities introduced in\u00a0a 1978 article\u00a0describing a digital method of encryption. <\/p>\n\n\n\n<p>All sorts of applications make use of encryption to keep our data safe, including CC numbers, medical reports and\u00a0cryptocurrencies\u00a0like <strong>Bitcoin<\/strong>. Blockchain, a technology on which <strong>Bitcoin<\/strong> works, connects hundreds of thousands of computers via a distributed network and uses <strong>cryptography<\/strong> to protect the identity of each user and maintain a log of their transactions which is permanent in nature.<\/p>\n\n\n\n<p>The introduction of computer networks brought a new problem: if Alice and Bob are located on different sides of the world, how would they exchange a secret key? According to\u00a0Khan Academy, public-key <strong>cryptography<\/strong> emerged as a solution. The public key <strong>cryptography<\/strong> takes advantage of one-way functions i.e. math\u00a0that is easy to perform but difficult to reverse without some information. Alice and Bob exchange their ciphertext and a public key under Eve&#8217;s watchful gaze, but each keeps a private key to themselves. By applying both private keys to the cipher text, the pair has the solution. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Quantum Leap<\/h2>\n\n\n\n<p>Nowadays, <strong>cryptographers<\/strong> are turning towards quantum physics in search of an unbreakable cipher. Quantum physics demonstrates the strange behavior of matter at incredibly small scales. During the 1970s and 1980s, some physicists started using this groovy property to encrypt secret messages, a method now known as &#8220;quantum key distribution.&#8221; Artur Ekert, an Oxford professor and director of the Centre for Quantum Technologies at the National University of Singapore told Live Science, &#8220;If there is a\u00a0quantum computer, existing <strong>cryptography<\/strong> systems, including those that underpin <strong>cryptocurrencies<\/strong>, will no longer be secure. Ekert further added that &#8220;We don&#8217;t know when they will be built \u2014 we had better start doing something right now.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since ancient times, many people have relied on cryptography. Cryptography is the art of writing and solving coded messages to keep the secrets safe and secure. During the 5th century, messages were inscribed on a material made up of leather or paper and delivered by a human messenger. Nowadays, ciphers help secure our digital data [&hellip;]<\/p>\n","protected":false},"author":59,"featured_media":802,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":[],"jnews_primary_category":[],"footnotes":""},"categories":[9],"tags":[],"class_list":["post-383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-chemistry-and-technology"],"_links":{"self":[{"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/posts\/383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/comments?post=383"}],"version-history":[{"count":2,"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/posts\/383\/revisions"}],"predecessor-version":[{"id":803,"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/posts\/383\/revisions\/803"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/media\/802"}],"wp:attachment":[{"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/media?parent=383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/categories?post=383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.science-pickers.com\/wp-json\/wp\/v2\/tags?post=383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}