Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/natthasath/demo-python-cryptography
Cryptography is the practice of securing communication through mathematical techniques, such as encryption, decryption, and key exchange.
https://github.com/natthasath/demo-python-cryptography
asymmetric-cryptography cryptography decryption encryption poetry python symmetric-cryptography
Last synced: 7 days ago
JSON representation
Cryptography is the practice of securing communication through mathematical techniques, such as encryption, decryption, and key exchange.
- Host: GitHub
- URL: https://github.com/natthasath/demo-python-cryptography
- Owner: natthasath
- License: mit
- Created: 2023-03-16T05:58:18.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-03-16T06:54:29.000Z (over 1 year ago)
- Last Synced: 2024-05-01T18:37:51.961Z (7 months ago)
- Topics: asymmetric-cryptography, cryptography, decryption, encryption, poetry, python, symmetric-cryptography
- Language: Python
- Homepage:
- Size: 11.7 KB
- Stars: 0
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README
# 🎉 DEMO Python Cryptography
Cryptography is the practice of securing communication through mathematical techniques, such as encryption, decryption, and key exchange.![version](https://img.shields.io/badge/version-1.0-blue)
![rating](https://img.shields.io/badge/rating-★★★★★-yellow)
![uptime](https://img.shields.io/badge/uptime-100%25-brightgreen)### 🔑🔑 Asymmetric Cryptography
___Asymmetric cryptography, also known as public-key cryptography, uses a pair of keys: a public key and a private key. Some of the commonly used algorithms for asymmetric cryptography include RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC).
A typical use case for asymmetric cryptography is secure communication over an insecure network, such as the internet. For example, when a user wants to send sensitive information to a server, they can encrypt the data using the server's public key. Only the server, which holds the corresponding private key, can decrypt the data.
Another use case for asymmetric cryptography is digital signatures. Digital signatures can be used to ensure the authenticity and integrity of data. For example, a digital signature can be added to a software package to ensure that it has not been tampered with.
One case study of asymmetric cryptography is the use of SSL/TLS for secure web communication. SSL/TLS uses asymmetric cryptography to establish a secure channel between the client and the server. The client and server exchange public keys and use them to negotiate a shared secret key, which is used for symmetric encryption of the data exchanged over the secure channel. This enables secure communication over the internet, such as online banking transactions, e-commerce, and secure email communication.
### 🔐 Symmetric Cryptography
___Symmetric cryptography uses a single secret key to encrypt and decrypt data. Some of the commonly used algorithms for symmetric cryptography include AES (Advanced Encryption Standard), DES (Data Encryption Standard), and Blowfish.
A typical use case for symmetric cryptography is encrypting data stored on a hard drive or transmitted over a secure network. For example, when a user wants to store sensitive data on their computer, they can encrypt the data using a symmetric encryption algorithm and a secret key. The same key can then be used to decrypt the data when needed.
Another use case for symmetric cryptography is securing communication between two parties who share a secret key. For example, a company might distribute a secret key to its employees for use in encrypting and decrypting sensitive data.
One case study of symmetric cryptography is the use of WPA2 for wireless network security. WPA2 uses a shared secret key to encrypt and decrypt data transmitted over a wireless network. This enables secure communication over the wireless network, such as online gaming, streaming video, and file sharing.