This action might not be possible to undo. Are you sure you want to continue?

# Cryptography

Cryptography or Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., cipher text).Decryption is the reverse, in other words, moving from the unintelligible cipher text back to plaintext. A cipher is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. A "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite possible cipher texts, finite possible keys, and the encryption and decryption algorithms which correspond to each key. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counterproductive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.

The term "code" is often used to mean any method of encryption or concealment of meaning. However, in cryptography, code has a more specific meaning. It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, wallaby replaces attack at dawn). Codes are no longer used in serious cryptography—except incidentally for such things as unit designations (e.g., Bronco Flight or Operation Overlord)—since properly chosen ciphers are both more

and substitution ciphers. 'hello world' becomes 'ehlol owrdl' in a trivially simple rearrangement scheme). The computer era The development of digital computers and electronics after WWII made possible much more complex ciphers.practical and more secure than even the best codes and also are better adapted to computers. i. unlike classical ciphers which only encrypted written language texts.. which systematically replace letters or groups of letters with other letters or groups of letters . among others. or literate opponents. More literacy. The main classical cipher types are transposition ciphers. encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end. Furthermore. rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message).. Cryptanalysis is the term used for the study of methods for obtaining the meaning of encrypted information without access to the key normally required to do so. computers allowed for the encryption of any kind of data representable in any binary format. this was new and significant. it is the study of how to crack encryption algorithms or their implementations. interactive proofs and secure computation. digital signatures. . Classic cryptography The earliest forms of secret writing required little more than local pen and paper analogs. History of cryptography and cryptanalysis Before the modern era.Encryption was used to ensure secrecy in communications.e. the field has expanded beyond confidentiality concerns to include techniques for message integrity checking..g. In recent decades.sender/receiver identity authentication. which rearrange the order of letters in a message (e.e. required actual cryptography. as most people could not read. cryptography was concerned solely with message confidentiality (i.

fast and requiring few resources. torture) have become more attractive in consequence. in which their keys are different. Alternate methods of attack (bribery. making cryptanalysis so inefficient and impractical as to be effectively impossible.The historian David Kahn described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic substitution emerged in the Renaissance". . Since messages are almost always longer than a single block. good modern ciphers have stayed ahead of cryptanalysis. A public key system is so constructed that calculation of one key (the 'private key') is computationally infeasible from the other (the 'public key'). Instead. both keys are generated secretly. while breaking it requires an effort many orders of magnitude larger. a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of plaintext and a key. called asymmetric key) cryptography in which two different but mathematically related keys are used—a public key and a private key. some method of knitting together successive blocks is required. Symmetric-key cryptography Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or.However. computers have also assisted cryptanalysis. in a sense. more generally. even though they are necessarily related. as an interrelated pair. threat. such as memory or CPU capability). Several have been developed. This was the only kind of encryption publicly known until June 1976. They are the modes of operation and must be carefully considered when using a block cipher in a cryptosystem.. but related in an easily computable way). it is typically the case that use of a quality cipher is very efficient (i. burglary. Whitfield Diffie and Martin Hellman proposed the notion of public-key (also. Public-key cryptography In a groundbreaking 1976 paper. A block cipher is. which has compensated to some extent for increased cipher complexity. Nonetheless. and vastly larger than that required for any classical cipher. and output a block of cipher text of the same size. The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. less commonly.e. some with better security in one aspect or another than others. Modern cryptography The modern field of cryptography can be divided into several areas of study.

Cryptographic primitives Much of the theoretical work in cryptography concerns cryptographic primitives— algorithms with basic cryptographic properties—and their relationship to other cryptographic problems. while the private or secret key is used for decryption. chosen-plaintext attack (CPA) security in the random oracle model). ElGamal encryption) are designed to provide particular functionality (e. or cryptosystem.In public-key cryptosystems. while its paired private key must remain secret. Legal issues Prohibitions Cryptography has long been of interest to intelligence gathering and law enforcement agencies. Cryptosystems (e.g. Cryptanalysis The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme.g. called a cryptographic system. Cryptosystems use the properties of the underlying cryptographic primitives to support the system's security properties. Export controls . the public key may be freely distributed. public key encryption) while guaranteeing certain security properties (e. thus permitting its subversion or evasion.g. The public key is typically used for encryption. Cryptosystems One or more cryptographic primitives are often used to develop a more complex algorithm.

a group of techniques for technologically controlling use of copyrighted material. shared-key. Digital rights management Cryptography is central to digital rights management (DRM). in this instance the private key cannot be derived from the public key. being widely implemented and deployed at the behest of some copyright holders. Asymmetric cryptography uses different encryption keys for encryption and decryption. symmetrical and asymmetrical. it does not necessarily need to be an exact copy. . and private-key. With careful planning of the coding and functions of the cryptographic process these threats can be greatly reduced. NSA was involved with the design of DES during its development at IBM and its consideration by the National Bureau of Standards as a possible Federal Standard for cryptography. These keys are labeled or known as a public and a private key. has a pair of keys. public or private. asymmetric encryption is as good as its applied use. use the same key for encryption as they do for decryption. In this case an end user on a network. The most common form of asymmetrical encryption is in the application of sending messages where the sender encodes and the receiving party decodes the message by using a random key generated by the public key of the sender. Symmetric cryptography is susceptible to plain text attacks and linear cryptanalysis meaning that they are hackable and at times simple to decode. Other names for this type of encryption are secret-key. The encryption key can be loosely related to the decryption key. or algorithms. Symmetric encryptions. The asymmetrical cryptography method has been proven to be secure against computationally limited intruders. one for encryption and one for decryption. Essentially. Cryptography Cryptography can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network. this is defined by the method in which the data is encrypted and for what use. The security is a mathematical definition based upon the application of said encryption. Cryptography uses two main styles or forms of encrypting data.NSA involvement Another contentious issue connected to cryptography in the United States is the influence of the National Security Agency on cipher development and policy.