Cryptography
Cryptography
Cryptography
DNA Cryptography
Cryptography is the branch of science which deals with the encoding of information for the
purpose of hiding messages. It plays a vital role in the infrastructure of communication security.
8. SMS Based:
This is quite straightforward. It is the standard procedure for delivering the OTP via a
text message after regular authentication is successful. Here, the OTP is generated on
the server side and delivered to the authenticator via text message. It is the most
common method of OTP delivery that is encountered across services.
9. Application Based:
This method of OTP generation is done on the user side using a specific smartphone
application that scans a QR code on the screen. The application is responsible for the
unique OTP digits. This reduces wait time for the OTP as well as reduces security risk
as compared to the SMS based delivery.
The most common way for the generation of OTP defined by The Initiative For Open
Authentication (OATH) is the Time Based One Time Passwords (TOTP), which is a Time
Synchronized OTP. In these OTP systems, time is the cardinal factor to generate the unique
password.
In order to reconstruct the given polynomial back, the Lagrange basis Polynomial is used.
Example –
{1, 2, 4, 10, 20, 40} is a super increasing as1<2, 1+2<4, 1+2+4<10,
1+2+4+10<20 and 1+2+4+10+20<40.
• Plain text: The plain text is the original message or data that is hidden from view
through a cryptographic encryption algorithm.
• Cipher text: It is the output of Encryption operation when given key and plain text. It is
also the data fed to a Decryption function.
• Key: The key is a piece of data or correlated pair of data when input with plain text into
an encryption function yields ciphertext. The key must be secured as the algorithm is
publicly available.
• Salt: A salt is a random piece of data when added to a hashing function, provides even
more entropy in the output, making attacks to happen less likely. A good cryptographic
hash should always use salt.