Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Cryptography

The science of securing information by transforming it into an unreadable format using mathematical algorithms.

Cryptography is the practice and study of techniques for securing communication and data in the presence of adversaries. It provides the mathematical foundation for confidentiality (keeping data secret), integrity (detecting unauthorized modifications), authentication (verifying identity), and non-repudiation (preventing denial of actions). Modern digital security depends entirely on cryptographic principles.

How It Works

Cryptography relies on mathematical algorithms and keys to transform data between readable (plaintext) and unreadable (ciphertext) forms. Symmetric cryptography uses a single shared key for both encryption and decryption, offering high performance for bulk data protection. Asymmetric cryptography uses a key pair where one key encrypts and the other decrypts, solving the key distribution problem at the cost of computational overhead.

Hash functions are a third cryptographic primitive that produces a fixed-size output (digest) from any input, with the property that it is computationally infeasible to reverse the process or find two inputs that produce the same output. Hashing is used for password storage, data integrity verification, and digital signatures.

Digital signatures combine hashing with asymmetric cryptography to provide both integrity and authentication. The sender hashes the message and encrypts the hash with their private key. The recipient decrypts the hash with the sender's public key and compares it against a freshly computed hash of the received message. A match confirms that the message was not altered and was sent by the private key holder.

Cryptographic protocols like TLS combine these primitives into complete systems that provide secure communication channels. TLS uses asymmetric cryptography for key exchange, symmetric cryptography for data encryption, and hash-based message authentication codes for integrity verification.

Why It Matters

Weak or improperly implemented cryptography is a frequent security finding. Common issues include using deprecated algorithms, hardcoded encryption keys, insufficient key lengths, improper random number generation, and storing sensitive data with reversible encoding rather than proper encryption. Security assessments evaluate cryptographic implementations to ensure they provide the intended level of protection.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment