DEV Community

Cover image for ๐Ÿ” Crypto is My guy (for Keeping Secrets)
PanicAtTheKernel
PanicAtTheKernel

Posted on

๐Ÿ” Crypto is My guy (for Keeping Secrets)

What Is Cryptography?

Cryptography is basically the art of secret messaging โ€“ like writing a diary in a language only you and your bestie understand. In fact, it literally means โ€œhidden writing.โ€

In simple terms, cryptography turns your message into unreadable gibberish (ciphertext) until someone with the right key unlocks it.

๐Ÿ”‘ Two Main Flavors:

  • Symmetric Cryptography:
    One shared secret key is used to both encrypt and decrypt. Fast and great for big data, but the key must be shared secretly.

  • Asymmetric Cryptography:
    Uses a public key (to lock) and a private key (to unlock). Anyone can send you a secure message using your public key, but only you can open it with your private key. No key sharing needed!


Where You See It Every Day ๐Ÿ”Ž

Cryptography isnโ€™t just for spiesโ€”itโ€™s hiding in plain sight:

  • ๐Ÿ”’ HTTPS / Secure Websites
    That padlock icon in your browser? Thatโ€™s crypto in action, securing your logins and shopping data with TLS (which uses both symmetric and asymmetric crypto).

  • ๐Ÿ—๏ธ Password Managers
    Vaults like Bitwarden or 1Password encrypt your stored credentials. Even if a hacker breaks in, all they get is scrambled nonsense.

  • ๐Ÿ“ฑ Messaging Apps
    WhatsApp, Signal, and Telegram use end-to-end encryption so only you and your friend can read the chatโ€”not even the appโ€™s servers can peek.

  • ๐Ÿ’ณ Online Payments & Banking
    When you enter card info online, it's encrypted using standards like AES or RSA, keeping it out of a cybercriminalโ€™s reach.


Modern Algorithms in Use โš™๏ธ

Here are the MVPs of modern-day cryptography, explained without jargon:

๐Ÿ” AES (Advanced Encryption Standard) โ€“ Symmetric

Used in Wi-Fi security, VPNs, encrypted SSDs, etc.
Encrypts data in 128-bit blocks using 128, 192, or 256-bit keys.
๐Ÿ’ช AES-256 is basically uncrackable via brute force.

๐Ÿ” RSA โ€“ Asymmetric

The OG public-key encryption from the 1970s.
Encrypt with public key, decrypt with private key.
Used in TLS, SSH, PGP, digital signatures.
๐Ÿ“‰ Slower, and needs bigger keys (2048+ bits) to stay secure.

๐Ÿ” ECC (Elliptic Curve Cryptography) โ€“ Asymmetric

Modern and mobile-friendly.
Much smaller keys than RSA with equal security (e.g. 256-bit ECC โ‰ˆ 3072-bit RSA).
Used in Bitcoin, Signal, and modern TLS certs.

๐Ÿ” SHA-256 (Secure Hash Algorithm) โ€“ Hash Function

Not encryption, but creates a fixed-length fingerprint of your data.
Used for verifying integrity (checksums), storing passwords securely, and powering blockchain tech like Bitcoin.
๐Ÿ” One-way onlyโ€”you canโ€™t reverse a SHA-256 hash back to the original data.


TL;DR ๐Ÿš€

Cryptography isnโ€™t just some nerdy side quest. Itโ€™s the tech that:

  • Protects your Wi-Fi
  • Secures your passwords
  • Encrypts your messages
  • Powers cryptocurrencies
  • And makes the internet safe to use

Whether itโ€™s AES scrambling your Wi-Fi traffic or SHA-256 validating your Bitcoin block, crypto is doing the hard math so you donโ€™t have to.


๐Ÿ” Tools Behind the Blog:
Python, OpenSSL, Wireshark (for fun!), and endless curiosity.


Top comments (0)