Cryptography or cryptology is the practice and study of techniques
for secure
communication in the presence of third parties called adversaries.
More generally, cryptography is about constructing and analyzing protocols
that prevent third parties or the public from reading private messages; various
aspects in information
security such as data confidentiality, data integrity, authentication, and non-repudiation[4] are central to modern
cryptography. Modern cryptography exists at the intersection of the disciplines
of mathematics, computer science, and electrical
engineering. Applications of cryptography include ATM cards,
computer passwords, and electronic
commerce.
Before the modern era, cryptography was
concerned solely with message confidentiality (i.e., encryption)—conversion of messages from a
comprehensible form into an incomprehensible one and back again at the other
end, rendering it unreadable by interceptors or eavesdroppers without secret
knowledge. Encryption attempted to ensure secrecy in communications, such as
those of spies, military leaders,
and diplomats. In recent
decades, the field has expanded beyond confidentiality concerns to include
techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive
proofs and secure
computation, among others.
Until modern times, cryptography
referred almost exclusively to encryption, which is the process of
converting ordinary information (called plaintext) into
unintelligible text (called ciphertext).[9] Decryption is the reverse, in
other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher)
is a pair of algorithms
that create the encryption and the reversing decryption. The detailed operation
of a cipher is controlled both by the algorithm and in each instance by a
"key".
The key is a secret (ideally known only to the communicants), usually a short
string of characters, which is needed to decrypt the ciphertext. Formally, a
"cryptosystem"
is the ordered list of elements of finite possible plaintexts, finite possible
cyphertexts, finite possible keys, and the encryption and decryption algorithms
which correspond to each key. Keys are important both formally and in actual
practice, as ciphers without variable keys can be trivially broken with only
the knowledge of the cipher used and are therefore useless (or even
counter-productive) for most purposes. Historically, ciphers were often used
directly for encryption or decryption without additional procedures such as authentication or
integrity checks. There are two kinds of cryptosystems: symmetric and
asymmetric. In symmetric systems the same key (the secret key) is used to
encrypt and decrypt a message. Data manipulation in symmetric systems is faster
than asymmetric systems as they generally use shorter key lengths. Asymmetric
systems use a public key to encrypt a message and a private key to decrypt it.
Use of asymmetric systems enhances the security of communication.[10] Examples of asymmetric systems
include RSA (Rivest-Shamir-Adleman), and ECC (Elliptic Curve
Cryptography). Symmetric models include the commonly used AES (Advanced
Encryption System) which replaced the older DES (Data Encryption Standard).
In colloquial use, the term
"code"
is often used to mean any method of encryption or concealment of meaning.
However, in cryptography, code has a more specific meaning. It means the
replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example,
"wallaby" replaces "attack at dawn").
Cryptanalysis is the term
used for the study of methods for obtaining the meaning of encrypted
information without access to the key normally required to do so; i.e., it is
the study of how to crack encryption algorithms or their implementations.
Some use the terms cryptography
and cryptology interchangeably in English, while others (including US
military practice generally) use cryptography to refer specifically to
the use and practice of cryptographic techniques and cryptology to refer
to the combined study of cryptography and cryptanalysis. English is more
flexible than several other languages in which cryptology (done by
cryptologists) is always used in the second sense above. RFC 2828 advises that steganography is sometimes
included in cryptology.
The study of characteristics of
languages that have some application in cryptography or cryptology (e.g.
frequency data, letter combinations, universal patterns, etc.) is called crypto
linguistics.
Alphabet shift ciphers are
believed to have been used by Julius Caesar over 2,000
years ago.This is an example with k=3. In other words, the letters in the alphabet are
shifted three in one direction to encrypt and three in the other direction to
decrypt.
references :
ReplyDeletehttps://en.wikipedia.org/wiki/Cryptography
Interesting, very detailed and simplified information about the topic.
ReplyDeleteLovely article. I wish you added some photos though. Thank you
ReplyDelete