**JSMedia –** In securing data, the most important process is encryption. This encryption process is contained in the cryptography section. If you want to delve deeper into this, of course **understanding cryptography** and its intricacies are things that must be learned.

## Definition of Cryptography

Cryptography is the process of changing a message so that its meaning can be hidden from opponents who might capture the meaning.

**Definition of cryptography** is a secret writing technique with many techniques with the aim of protecting information that is present in an unreadable format. Only designated recipients can convert an unreadable format into a readable format.

In an electronic transaction, cryptography is adopted to secure email, credit card details, storage providers, and other sensitive information.

## 6 Cryptographic Components

There are several components included in cryptography. These components need to be known by those of you who want to explore the science of cryptography, namely:

### 1. plaintext

Plaintext can be text, images, or binary code that is converted into a form that cannot be read by anyone except the person carrying the secret to unlock. This refers to the original unsigned or encrypted message that the sender intended to send.

### 2. Ciphertext

During the encryption process plaintext can be converted into a rushed format, the resulting format is ciphertext. It also deals with encrypted messages, recipients receive them.

However, ciphertext is like plaintext which has been operated by encryption to produce the final result. The final result is in the form of an original message even though it is in an unofficial form, except by cracking the code.

### 3. Encryption

This component will receive the information and then convert it into an unreadable format that can be reversed. This is the process of encrypting the plaintext, so that it can provide the ciphertext.

Encryption requires an algorithm known as a cipher and a secret key. No one can decrypt the information in an encrypted message without knowing the secret key. Plaintext is converted into ciphertext by using cipher encryption.

### 4. Decryption

Decryption is the opposite of encryption. Decryption will change the ciphertext into plaintext using a decryption algorithm and a secret key.

### 5. Cipher

The encryption and decryption algorithms are collectively referred to as ciphers. The cipher or algorithm is the most difficult but interesting part of the encryption process.

Cipher or algorithm is a formula consisting of steps that describe the encryption and decryption process performed on an information. The base cipher will take the bits then return the bits and it doesn’t matter if the bits represent images, videos or text.

### 6. Key

Generally, the key is in the form of a number or a series of numbers on which the password works. Understanding the key is separate information that is used to control the output (plaintext and ciphertext) of a given algorithm.

Each encryption and decryption algorithm requires a key to encrypt the message. To convert plaintext into ciphertext, the sender uses an encryption algorithm and a secret key.

On the other hand, the recipient will use a decryption algorithm and a secret key to convert the ciphertext into plaintext.

Also Read:

Understanding Online Business

## The Purpose of Cryptography Comes

Even though you are not a coding expert, it turns out that aspects of cryptography can also be applied for personal needs. Currently the term cryptography has shifted to modern cryptography due to changes in the priority of techniques used to protect data.

There are several purposes of modern cryptography used by a cryptographer, namely:

- Confidentiality means that protected information cannot be accessed by unauthorized parties.
- Integrity means that data will be received and sent and cannot be changed without the consent of both parties.
- Non-repudiation is that neither the recipient nor the sender can deny the purpose of creating or changing information.
- Authentication, namely the recipient and the sender can find out the identity of each and the source of the data used.

Procedures and protocols that have fulfilled the purpose of cryptography are cryptographic systems. Cryptographic system is also often considered as a program that refers to computer programming procedures and mathematical calculations.

However, in reality it is not like that. Currently cryptography activists have also included settings that have been adapted to human behavior.

For example, using hard-to-guess passwords, logging off automatically when the system is not in use, and prohibiting discussions of sensitive procedures with unauthorized parties.

**Definition of cryptography** in short is a coding system that serves to prevent access from irresponsible people. Cryptography has a role to prevent losses that can occur, especially in an all-digital age.