CRYPTOGRAPHIC FUNCTIONS

Cryptography is a type of coded language where the information being transmitted reaches and can be read only by those whom it is intended. There are several techniques involved in cryptography. Some of these techniques are combining words & images, hiding messages in storage or transit through various means and microdots. Today’s world is centered around computers and internet. Hence, it doesn’t come as a surprise that messages are transmitted through processes called encryption (converting plain text into cyphertext) and decryption (converting coded or cyphertext into plain text). Those carrying out this process are known as cryptographers.

"Cryptographic functions are implemented to evaluate the integrity of data, authentication control and other security mechanisms."

SECURITY USES OF SECRET KEY CRYPTOGRAPHY

The next few sections describe the types of things one might do with secret key cryptography

TRANSMITTING OVER AN INSECURE CHANNEL

To do away with one’s transactions being intercepted, one needs to encrypt them. Stake coin uses technology to encrypt and decrypt messages so that none other than user and receiver can decipher it.

AUTHENTICATION

The term strong authentication means that someone can prove knowledge of a secret without revealing it. Strong authentication is possible with cryptography. Strong authentication is particularly useful when two computers are trying to communicate over an insecure network (since few people can execute cryptographic algorithms in their heads).

SECURE STORAGE ON INSECURE MEDIA

To secure one’s information one can invent a key and as long as the individual remembers the key, their information is safe and can be recovered at their convenience.

INTEGRITY CHECK

To provide protection against malicious changes to a message, a secret checksum algorithm is required, such that an attacker who does not know the algorithm can’t compute the correct checksum for the message to be accepted as authentic. As with encryption algorithms, it’s better to have a common (known) algorithm and a secret key. This is what a cryptographic checksum does.