datatrota
Signup Login
Home Jobs Blog

Cryptography Jobs in Nigeria

View jobs that require Cryptography skill on TechTalentZone
  • Ethnos Cyber Limited logo

    Security Consultant

    Ethnos Cyber LimitedLagos, Nigeria06 December

    Ethnos Cyber Limited, As the preferred cybersecurity solutions provider in Africa, the success of Ethnos Cyber hinges, to a huge extent, on the dedication and ...

    Onsite
  • Darey.io logo

    Lead Instructor – Cybersecurity

    Darey.ioLagos, Nigeria11 November

    Darey.io is a social learning platform where you can learn DevOps amongst peers and mentors, and gain practical experience across multiple real-world use ...

    Hybrid
  • Canonical logo

    Engineering Manager - Security Standards and Hardening

    CanonicalLagos, Nigeria09 October

    We deliver open source to the world faster, more securely and more cost effectively than any other company. We develop Ubuntu, the world’s most popular ...

    Remote
  • Julius Berger logo

    IT-System Administrator / IT-Coordinator

    Julius BergerAbuja, Nigeria19 September

    Julius Berger Nigeria Plc (Julius Berger) is a leading construction company offering integrated solutions and related services. Julius Berger specializes in ...

    Onsite
  • Canonical logo

    Engineering Manager - Security Standards and Hardening

    CanonicalLagos, Nigeria30 August

    We deliver open source to the world faster, more securely and more cost effectively than any other company. We develop Ubuntu, the world’s most popular ...

    Remote
  • eRecruiter Nigeria logo

    Technical Pre-Sales Executive - Abuja

    eRecruiter NigeriaAbuja, Nigeria01 August

    eRecruiter Nigeria has deep knowledge of Human resources and recruitment. Our business is in Talent acquisition, recruitment, outsourcing and everything that ...

    Onsite
  • Canonical logo

    Security Software Engineer

    CanonicalLagos, Nigeria19 July

    We deliver open source to the world faster, more securely and more cost effectively than any other company. We develop Ubuntu, the world’s most popular ...

    Remote
  • Canonical logo

    Linux Cryptography and Security Engineer

    CanonicalLagos, Nigeria19 July

    We deliver open source to the world faster, more securely and more cost effectively than any other company. We develop Ubuntu, the world’s most popular ...

    Onsite
  • Moniepoint Inc. (Formerly TeamApt Inc.) logo

    Cloud Security Architect

    Moniepoint Inc. (Form..Lagos, Nigeria11 July

    Moniepoint is a financial technology company digitising Africa’s real economy by building a financial ecosystem for businesses, providing them with all ...

    Onsite
  • Moniepoint Inc. (Formerly TeamApt Inc.) logo

    Cloud Security Engineer

    Moniepoint Inc. (Form..Lagos, Nigeria10 July

    Moniepoint is a financial technology company digitising Africa’s real economy by building a financial ecosystem for businesses, providing them with all ...

    Hybrid
  • Alfred & Victoria Associates logo

    Security Architect

    Alfred & Victoria..Lagos, Nigeria08 July

    Alfred & Victoria Associates is one of Nigeria’s leading ICT solution based company. Our company offers a wide range of services which are in high ...

    Onsite
  • Canonical logo

    Security Software Engineer

    CanonicalLagos, Nigeria26 June

    We deliver open source to the world faster, more securely and more cost effectively than any other company. We develop Ubuntu, the world’s most popular ...

    Remote
  • Canonical logo

    Linux Cryptography and Security Engineer

    CanonicalLagos, Nigeria26 June

    We deliver open source to the world faster, more securely and more cost effectively than any other company. We develop Ubuntu, the world’s most popular ...

    Remote
  • DigiFame logo

    Head of Engineering

    DigiFameLagos, Nigeria09 May

    DigiFame Is a digital Marketing and recruitment agency, focused on delivering top-notch consultancy servicesDescription  You are also responsible for ...

    Onsite
  • Vennote Technologies Limited logo

    Cyber Security Instructor

    Vennote Technologies ..Lagos, Nigeria17 April

    Vennote Technologies Limited is a well-established ICT company with experience spanning over two decades in enterprise solutions using best of breed products ...

    Onsite
  • App Heroes Innovation Center logo

    Cyber Security Instructor

    App Heroes Innovation..Lagos, Nigeria15 April

    App Heroes is a technology innovation center for young Nigerians with a vision is to provide education in technology and promote collaboration to foster ...

    Onsite

What is Cryptography?

Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. It refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email.

Modern cryptography has mainly four objectives:

  1. Confidentiality: The information cannot be understood by anyone for whom it was unintended.
  2. Integrity: The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.
  3. Non-repudiation: The creator/sender of the information cannot deny at a later stage their intentions in the creation or transmission of the information.
  4. Authentication: The sender and receiver can confirm each other's identity and the origin/destination of the information

Types of Cryptographyic Algorithms 

  • Symmetric Key Cryptography: It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system are Data Encryption System(DES) and Advanced Encryption System(AES).
  • Hash Functions: There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.
  • Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and decrypt information. A receiver’s public key is used for encryption and a receiver’s private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone know his private key. The most popular asymmetric key cryptography algorithm is RSA algorithm.

Advantages of Cryptography 

  1. Access Control: Cryptography can be used for access control to ensure that only parties with the proper permissions have access to a resource. Only those with the correct decryption key can access the resource thanks to encryption.
  2. Secure Communication: For secure online communication, cryptography is crucial. It offers secure mechanisms for transmitting private information like passwords, bank account numbers, and other sensitive data over the internet.
  3. Protection against attacks: Cryptography aids in the defence against various types of assaults, including replay and man-in-the-middle attacks. It offers strategies for spotting and stopping these assaults.
  4. Compliance with legal requirements: Cryptography can assist firms in meeting a variety of legal requirements, including data protection and privacy legislation.

Application of Cryptography

  • Computer passwords: Cryptography is widely utilized in computer security, particularly when creating and maintaining passwords. When a user logs in, their password is hashed and compared to the hash that was previously stored. Passwords are hashed and encrypted before being stored. In this technique, the passwords are encrypted so that even if a hacker gains access to the password database, they cannot read the passwords.
  • Digital Currencies: To safeguard transactions and prevent fraud, digital currencies like Bitcoin also use cryptography. Complex algorithms and cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge the transactions.
  • Secure web browsing: Online browsing security is provided by the use of cryptography, which shields users from eavesdropping and man-in-the-middle assaults. Public key cryptography is used by the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt data sent between the web server and the client, establishing a secure channel for communication.
  • Electronic signatures: Electronic signatures serve as the digital equivalent of a handwritten signature and are used to sign documents. Digital signatures are created using cryptography and can be validated using public key cryptography. In many nations, electronic signatures are enforceable by law, and their use is expanding quickly.
  • Authentication: Cryptography is used for authentication in many different situations, such as when accessing a bank account, logging into a computer, or using a secure network. Cryptographic methods are employed by authentication protocols to confirm the user’s identity and confirm that they have the required access rights to the resource.
  • Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin and Ethereum to safeguard transactions, thwart fraud, and maintain the network’s integrity. Complex algorithms and cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge the transactions.
  • End-to-End Encryption: End-to-end encryption is used to protect two-way communications like video conversations, instant messages, and email. Even if the message is encrypted, it assures that only the intended receivers can read the message. End-to-end encryption is widely used in communication apps like WhatsApp and Signal, and it provides a high level of security and privacy for users.