

The inscriber inserted unusual symbols in place of more common hieroglyphic symbols to transform the inscription. The earliest known use to date is in an inscription that belonged to a nobleman’s tomb in Egypt in 1900 B.C. While the use of cryptography in network communications began with the advent of computers, the origins of cryptography extends much further back into history. Well-known examples of cryptographic techniques used in cybersecurity are digital signatures, time stamping, the SSL protocol, and public key authentication with secure shell (SSH). Data encryption applies the principles of cryptography and refers to the method used to encode data into an unintelligible format.Ĭryptography enables cybersecurity professionals to secure sensitive company information.

There are three basic types of cryptographic algorithms that are used: secret key, public key, and hash function algorithms.

In the context of computer science, cryptography focuses on the mathematical concepts and algorithms that keep communications hidden from unauthorized viewers. The goal of cryptography is to keep information secure at rest and during its transfer. The discipline of cryptography includes the study and practice of transforming data from its original format into an unintelligible format. This guide provides an overview of what cryptography is, a brief history of cryptography, and the differences between symmetric asymmetric encryption. From digital signatures to disk encryption, these everyday applications of cryptography enable users of the Internet, developers, and business to keep sensitive data private. Cryptography is a cornerstone of modern secure communication practices.
