The name given to the algorithm that encrypts and decrypts information.

Cipher

Introduction

Cipher contains algorithms for protecting the confidentiality of data.

A block cipher is basically encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a particular block of text, rather than encrypting one bit at a time.

For example, a common block cipher, AES, encrypts 128-bit blocks with a key of predetermined length: 128, 192, or 256 bits.

Blockchains make use of two such types of cryptographic algorithms, one being the asymmetric-key algorithms, and the other being hash functions

Types of Cyphers

  1. Symmetric-Key Cryptography – In such an encryption method, user takes take a single key into application.  

 This common key is used for both processes, encryption as well as in the decryption process. Using a common single key creates a problem of securely transferring the key between the senders and the receivers.

  1. Asymmetric-Key Cryptography- In such an encryption method, users use a pair of keys, an encryption key, and a decryption key, named public key and private key respectively. 

The key pair that is further generated by this algorithm consists of a private key and a unique public key that is generated using the same algorithm. 

It is also called Public-Key Cryptography.

  1. Hash Functions â€“ Such an encryption doesn’t make use of keys. 

It in fact makes use of a a cipher to generate a hash value of a fixed length from the plaintext. 

It is absolutely impossible for the contents of a plain text to be recovered from the ciphertext.

सिफ़र

परिचय

डेटा à¤•ी à¤—ोपनीयता à¤•ी à¤¸à¥à¤°à¤•्षा à¤•े à¤²à¤¿à¤ à¤¸à¤¿à¤«à¤° à¤®à¥‡à¤‚ à¤à¤²à¥à¤—ोरिदम à¤¹à¥‹à¤¤à¥‡ à¤¹à¥ˆà¤‚।

एक à¤¬à¥à¤²à¥‰à¤• à¤¸à¤¿à¤«à¤° à¤®à¥‚ल à¤°à¥‚प à¤¸à¥‡ à¤à¤¨à¥à¤•्रिप्शन à¤µà¤¿à¤§à¤¿ à¤¹à¥ˆ à¤œà¥‹ à¤à¤• à¤¸à¤®à¤¯ à¤®à¥‡à¤‚ à¤à¤• à¤¬à¤¿à¤Ÿ à¤•ो à¤à¤¨à¥à¤•्रिप्ट à¤•रने à¤•े à¤¬à¤œà¤¾à¤¯ à¤ªà¤¾à¤  à¤•े à¤•िसी à¤µà¤¿à¤¶à¥‡à¤· à¤¬à¥à¤²à¥‰à¤• à¤•ो à¤à¤¨à¥à¤•्रिप्ट à¤•रने à¤•े à¤²à¤¿à¤ à¤à¤• à¤¸à¤®à¤®à¤¿à¤¤ à¤•ुंजी à¤•े à¤¸à¤¾à¤¥ à¤à¤• à¤¨à¤¿à¤¯à¤¤à¤¾à¤¤à¥à¤®à¤• à¤à¤²à¥à¤—ोरिथम à¤²à¤¾à¤—ू à¤•रता à¤¹à¥ˆà¥¤

उदाहरण à¤•े à¤²à¤¿à¤, à¤à¤• à¤†à¤® à¤¬à¥à¤²à¥‰à¤• à¤¸à¤¿à¤«à¤°, à¤à¤ˆà¤à¤¸, à¤ªà¥‚र्व à¤¨à¤¿à¤°à¥à¤§à¤¾à¤°à¤¿à¤¤ à¤²à¤‚बाई à¤•ी à¤à¤• à¤•ुंजी à¤•े à¤¸à¤¾à¤¥ 128-बिट à¤¬à¥à¤²à¥‰à¤• à¤•ो à¤à¤¨à¥à¤•्रिप्ट à¤•रता à¤¹à¥ˆ: 128, 192, à¤¯à¤¾ 256 à¤¬à¤¿à¤Ÿà¥à¤¸à¥¤

ब्लॉकचेन à¤‡à¤¸ à¤¤à¤°à¤¹ à¤•े à¤¦à¥‹ à¤•्रिप्टोग्राफ़िक à¤à¤²à¥à¤—ोरिदम à¤•ा à¤‰à¤ªà¤¯à¥‹à¤— à¤•रते à¤¹à¥ˆà¤‚, à¤à¤• à¤…सममित–कुंजी à¤à¤²à¥à¤—ोरिदम à¤”र à¤¦à¥‚सरा à¤¹à¥ˆà¤¶ à¤«à¤¼à¤‚क्शंस।

साइफर के प्रकार

  1. सिमिट्रिक-की क्रिप्टोग्राफी – à¤‡à¤¸ à¤¤à¤°à¤¹ à¤•ी à¤à¤¨à¥à¤•्रिप्शन à¤µà¤¿à¤§à¤¿ à¤®à¥‡à¤‚, à¤‰à¤ªà¤¯à¥‹à¤—कर्ता à¤à¤ªà¥à¤²à¤¿à¤•ेशन à¤®à¥‡à¤‚ à¤à¤• à¤¹à¥€ à¤•ुंजी à¤²à¥‡à¤¤à¤¾ à¤¹à¥ˆà¥¤

 à¤¯à¤¹ à¤¸à¤¾à¤®à¤¾à¤¨à¥à¤¯ à¤•ुंजी à¤¦à¥‹à¤¨à¥‹à¤‚ à¤ªà¥à¤°à¤•्रियाओं, à¤à¤¨à¥à¤•्रिप्शन à¤•े à¤¸à¤¾à¤¥â€“साथ à¤¡à¤¿à¤•्रिप्शन à¤ªà¥à¤°à¤•्रिया à¤•े à¤²à¤¿à¤ à¤‰à¤ªà¤¯à¥‹à¤— à¤•ी à¤œà¤¾à¤¤à¥€ à¤¹à¥ˆà¥¤ à¤à¤• à¤¸à¤¾à¤®à¤¾à¤¨à¥à¤¯ à¤à¤•ल à¤•ुंजी à¤•ा à¤‰à¤ªà¤¯à¥‹à¤— à¤•रने à¤¸à¥‡ à¤ªà¥à¤°à¥‡à¤·à¤•ों à¤”र à¤°à¤¿à¤¸à¥€à¤µà¤° à¤•े à¤¬à¥€à¤š à¤•ुंजी à¤•ो à¤¸à¥à¤°à¤•्षित à¤°à¥‚प à¤¸à¥‡ à¤¸à¥à¤¥à¤¾à¤¨à¤¾à¤‚तरित à¤•रने à¤•ी à¤¸à¤®à¤¸à¥à¤¯à¤¾ à¤ªà¥ˆà¤¦à¤¾ à¤¹à¥‹à¤¤à¥€ à¤¹à¥ˆà¥¤

  1. असममित-कुंजी क्रिप्टोग्राफ़ी- à¤‡à¤¸ à¤¤à¤°à¤¹ à¤•ी à¤à¤¨à¥à¤•्रिप्शन à¤µà¤¿à¤§à¤¿ à¤®à¥‡à¤‚, à¤‰à¤ªà¤¯à¥‹à¤—कर्ता à¤•्रमशः à¤•ुंजियों à¤•ी à¤à¤• à¤œà¥‹à¤¡à¤¼à¥€, à¤à¤• à¤à¤¨à¥à¤•्रिप्शन à¤•ुंजी à¤”र à¤à¤• à¤¡à¤¿à¤•्रिप्शन à¤•ुंजी à¤•ा à¤¨à¤¾à¤® à¤¦à¥‡à¤¤à¥‡ à¤¹à¥ˆà¤‚, à¤œà¤¿à¤¸à¤•ा à¤¨à¤¾à¤® à¤¸à¤¾à¤°à¥à¤µà¤œà¤¨à¤¿à¤• à¤•ुंजी à¤”र à¤¨à¤¿à¤œà¥€ à¤•ुंजी à¤¹à¥ˆà¥¤

इस à¤à¤²à¥à¤—ोरिथ्म à¤¦à¥à¤µà¤¾à¤°à¤¾ à¤†à¤—े à¤¬à¤¨à¤¾à¤ˆ à¤—ई à¤ªà¥à¤°à¤®à¥à¤– à¤œà¥‹à¤¡à¤¼à¥€ à¤®à¥‡à¤‚ à¤à¤• à¤¨à¤¿à¤œà¥€ à¤•ुंजी à¤”र à¤à¤• à¤…द्वितीय à¤¸à¤¾à¤°à¥à¤µà¤œà¤¨à¤¿à¤• à¤•ुंजी à¤¹à¥‹à¤¤à¥€ à¤¹à¥ˆ à¤œà¥‹ à¤¸à¤®à¤¾à¤¨ à¤à¤²à¥à¤—ोरिथ्म à¤•ा à¤‰à¤ªà¤¯à¥‹à¤— à¤•रके à¤‰à¤¤à¥à¤ªà¤¨à¥à¤¨ à¤¹à¥‹à¤¤à¥€ à¤¹à¥ˆà¥¤

इसे à¤ªà¤¬à¥à¤²à¤¿à¤•–की à¤•्रिप्टोग्राफी à¤­à¥€ à¤•हा à¤œà¤¾à¤¤à¤¾ à¤¹à¥ˆà¥¤

  1. हैश फंक्शंस â€“ à¤‡à¤¸ à¤¤à¤°à¤¹ à¤•े à¤à¤• à¤à¤¨à¥à¤•्रिप्शन à¤•ुंजी à¤•ा à¤‰à¤ªà¤¯à¥‹à¤— à¤¨à¤¹à¥€à¤‚ à¤•रते à¤¹à¥ˆà¤‚।

यह à¤µà¤¾à¤¸à¥à¤¤à¤µ à¤®à¥‡à¤‚ à¤ªà¥à¤²à¥‡à¤¨ à¤¸à¥‡ à¤à¤• à¤¨à¤¿à¤¶à¥à¤šà¤¿à¤¤ à¤²à¤‚बाई à¤•े à¤¹à¥ˆà¤¶ à¤®à¥‚ल्य à¤‰à¤¤à¥à¤ªà¤¨à¥à¤¨ à¤•रने à¤•े à¤²à¤¿à¤ à¤à¤• à¤¸à¤¿à¤«à¤° à¤•ा à¤‰à¤ªà¤¯à¥‹à¤— à¤•रता à¤¹à¥ˆà¥¤

एक à¤¸à¤¾à¤¦à¥‡ à¤ªà¤¾à¤  à¤•ी à¤¸à¤¾à¤®à¤—्री à¤•े à¤²à¤¿à¤ à¤¸à¤¿à¤«à¤°à¤Ÿà¥‡à¤•्स्ट à¤¸à¥‡ à¤ªà¥à¤¨à¤°à¥à¤ªà¥à¤°à¤¾à¤ªà¥à¤¤ à¤•रना à¤¬à¤¿à¤²à¥à¤•ुल à¤…संभव à¤¹à¥ˆà¥¤