A Review on Various Methods of Cryptography for Cyber Security
In the increasingly digitized world, cryptography plays a pivotal role in safeguarding data and enhancing data security by encoding it to be accessible only to specific recipients. Cryptographic systems contain several core components: plain text, cipher text, encryption, decryption, and the key. Data security objectives addressed by cryptography include ensuring confidentiality, authentication of user identities, integrity of data, non-repudiation to prevent denial of actions, access control, and the availability of information to authorized users. Two encryption techniques, such as symmetric (shared secret) and asymmetric (public key) cryptography, are used. However, the effectiveness of these techniques is challenged by a variety of attacks, ranging from direct security breaches to unauthorized application installations. Cybersecurity measures also span several domains, including application security, information protection, and email security, and others. Effective defense against cyberattacks incorporates multiple strategies, such as authentication mechanisms. This paper reviews the multitude of aspects of cryptography and encryption and their usage in maintaining data security.