Cybersecurity Fundamentals 07

Pravin BhatiyaPravin Bhatiya
2 min read

Locking Data & Unlocking Careers

Part 7 : Cryptography — The Science That Keeps Secrets Safe

What makes WhatsApp chats private? Or keeps your online banking secure?
It’s not luck. It’s cryptography — the art and science of hiding information.


🔍 What is Cryptography?

Cryptography transforms readable data (plaintext) into unreadable form (ciphertext) using algorithms and keys — and only those with the right key can decode it.

"Tumhara message agar beech me koi intercept kare, toh wo sirf encrypted garbage dekhe — asli baat sirf receiver hi padhega."


2. Core Types:

🔹 Symmetric Encryption
Same key is used for encryption and decryption.

Ex: AES (Advanced Encryption Standard)

🔹 Asymmetric Encryption
Uses two keys — public and private.

Ex: RSA (Used in secure websites: https://)


Real-Life Uses:

  • Banking transactions

  • Online shopping

  • Secure emails (PGP)

  • VPNs

  • Bitcoin and Blockchain

Fun Fact: End-to-end encrypted apps (like Signal, WhatsApp) use asymmetric cryptography under the hood.


🛡️Why You Need It as a Cybersecurity Pro:

Whether you become a SOC Analyst, Pen Tester, or Forensics Expert, you’ll need to:

  • Understand cryptographic algorithms

  • Analyze encrypted threats or payloads

  • Validate secure communications

Tools to explore:

  • Wireshark (see encrypted packets)

  • OpenSSL (play with encryption)

  • CyberChef (visual crypto tool)

0
Subscribe to my newsletter

Read articles from Pravin Bhatiya directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Pravin Bhatiya
Pravin Bhatiya