Much is said about encryption for web applications, but few programmers really master the concept. In short, cryptography is based on sending and receiving information securely. A set of techniques and concepts is responsible for making the data to be hidden when transmitted from a sender to a receiver.

In programming, encryption is the use of keys that make the uploaded data to be “hidden”. A set of bits based on a particular algorithm is able to encode and decode the information. In this case, cryptography utilizes keys – if the receiver does not have a compatible key with the key of the issuer, the information may not be displayed.

010150120207-criptografia-ifsc

There are two types of keys that can be used within the concept of encryption in programming. These are symmetric and asymmetric keys.

 

SYMMETRIC KEY

This type of key is the simplest. Transmitter and receiver make use of the same key, i.e., a single key is used for encryption and decryption of information. There are in the market many algorithms using symmetric keys, for example, DES, IDEA and RC.

Symmetric keys, however, need attention with regard to its use. Its use is not appropriate in situations where information is very valuable. At first, you must use a lot of keys if many people or entities are involved. One should also be careful also about the key usage, since the chance of an intruder get the key to decode the information is much higher.

033_dicascuriosidades_materia

 

ASYMMETRIC KEY

Also known as “public key”, this type of key works with two types: private and public. The public is created for issuers, regarless the quantity of them. The private one is sent only to the recipient, this, in turn, is secret and should not be shared with anyone else.

Among the best known asymmetric Keys, we highlight RSA and Diffie-Hellman.

Some features, present in the web world, also use this same concept, the digital document certification is one of them.

Data can only be considered encrypted if it follows four basic principles: confidentiality, authentication, integrity and non repudiation (where the receiver accepts the sending of information). Therefore, ensure that these four principles are covered is what makes a potentially secure information.

You might also like…

PROCESAMIENTO AJAX EN SCRIPTCASE

Ajax en los formularios de Scriptcase puede usarse para recargar un campo de tipo de select basado e...

IMPORTAR IMAGENES DE LA BASE DE DATOS Y UTILIZAR CLASES DE BOOSTRAP

Como muchas personas ya saben, Bootstrap es una biblioteca de front-end libre y de código abierto p...

TENDENCIAS DE DESARROLLO WEB PARA 2017

Usted verá en este post tendencias para 2017 en Diseño Web, en el medio digital y en el desarrollo...

Comment this post

Get new posts, resources, offers and more each week.

We will use the information you provide to update you about our Newsletter and Special Offers. You can unsubscribe any time you want by clinck in a link in the footer of any email you receive from us, or by contacting us at sales@scriptcase.net. Learn more about our Privacy Police.