TM completed segments: 0
Other segments: 440
TM completed words: 0
Other words: 3922
Original | Translated |
---|
Original | Similar TM records |
---|---|
Introduction to Cryptography | |
Cryptography | |
Cryptography or cryptology (from | |
https://en.wikipedia.org/wiki/Ancient_Greek_language | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/Greer_Garson https://en.wikipedia.org/wiki/Alabama |
https://en.wikipedia.org/wiki/Cryptography#cite_note-1 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-1 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-19 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-18 |
https://en.wikipedia.org/wiki/Secure_communication | https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/National_Security_Agency |
https://en.wikipedia.org/wiki/Adversary_(cryptography) | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/Ava_Gardner https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Cryptography#cite_note-rivest90-2 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-2 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-90 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-29 |
https://en.wikipedia.org/wiki/Communications_protocol | https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/Goliath |
https://en.wikipedia.org/wiki/Cryptography#cite_note-modern-crypto-3 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-3 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-35 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-34 |
https://en.wikipedia.org/wiki/Information_security | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Vatican_City |
https://en.wikipedia.org/wiki/Confidentiality | https://en.wikipedia.org/wiki/Central_Park https://en.wikipedia.org/wiki/Goliath https://en.wikipedia.org/wiki/David |
https://en.wikipedia.org/wiki/Data_integrity | https://en.wikipedia.org/wiki/David https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Bathsheba https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/Antisemitism |
https://en.wikipedia.org/wiki/Non-repudiation | https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Goliath https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-47 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-42 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
Modern cryptography exists at the intersection of the disciplines of | |
https://en.wikipedia.org/wiki/Mathematics | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/Bathsheba https://en.wikipedia.org/wiki/Goliath |
https://en.wikipedia.org/wiki/Computer_science | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Harper_Lee |
https://en.wikipedia.org/wiki/Electrical_engineering | https://en.wikipedia.org/wiki/Central_Park https://en.wikipedia.org/wiki/Easter_Rising https://en.wikipedia.org/wiki/Edwin_Duerr |
https://en.wikipedia.org/wiki/Communication_science | https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Physics | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
Applications of cryptography include | |
https://en.wikipedia.org/wiki/Electronic_commerce | https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/Napoleonic_Wars https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Credit_card_chip | https://en.wikipedia.org/wiki/Pre-medical https://en.wikipedia.org/wiki/Richard_Nixon https://en.wikipedia.org/wiki/Alfred_Hitchcock |
https://en.wikipedia.org/wiki/Digital_currencies | https://en.wikipedia.org/wiki/Social_classes https://en.wikipedia.org/wiki/Burl_Ives https://en.wikipedia.org/wiki/Daniel_Berrigan |
https://en.wikipedia.org/wiki/Password | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Military_communications | https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/MGM |
Cryptography prior to the modern age was effectively synonymous with | |
https://en.wikipedia.org/wiki/Encryption | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Nonsense | https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/Nazism |
The originator of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. | |
The cryptography literature | |
https://en.wikipedia.org/wiki/Alice_and_Bob | https://en.wikipedia.org/wiki/Alabama https://en.wikipedia.org/wiki/Bob_Dornan https://en.wikipedia.org/wiki/AllMovie |
https://en.wikipedia.org/wiki/Eavesdropper | https://en.wikipedia.org/wiki/David https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Cryptography#cite_note-codesintro-5 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-5 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-58 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
https://en.wikipedia.org/wiki/Rotor_machine | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Robert_Bork |
https://en.wikipedia.org/wiki/World_War_I | https://en.wikipedia.org/wiki/World_War_II https://en.wikipedia.org/wiki/Second_World_War https://en.wikipedia.org/wiki/Korean_War |
https://en.wikipedia.org/wiki/Computer | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/World_War_II | https://en.wikipedia.org/wiki/World_War_II https://en.wikipedia.org/wiki/Second_World_War https://en.wikipedia.org/wiki/Korean_War |
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic | |
https://en.wikipedia.org/wiki/Algorithm | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/Alabama https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Computational_hardness_assumption | https://en.wikipedia.org/wiki/National_Board_of_Review https://en.wikipedia.org/wiki/Charlton_Heston https://en.wikipedia.org/wiki/Charles_Laughton |
It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. | |
These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in | |
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Barker_(occupation) https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/Peter_von_Bagh |
There exist | |
https://en.wikipedia.org/wiki/Information_theoretic_security | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/National_Security_Agency |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/The_Omen https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
The growth of cryptographic technology has raised a number of legal issues in the information age. | |
Cryptography’s potential for use as a tool for | |
https://en.wikipedia.org/wiki/Espionage | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Sedition | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Sorority |
https://en.wikipedia.org/wiki/Cryptography#cite_note-cryptolaw-6 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-6 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-69 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
https://en.wikipedia.org/wiki/Key_disclosure_law | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Audrey_Hepburn |
https://en.wikipedia.org/wiki/Cryptography#cite_note-UK_law-7 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-74 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-73 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-RangerSteve1-8 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-81 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-6 |
https://en.wikipedia.org/wiki/Digital_rights_management | https://en.wikipedia.org/wiki/Ky_Ebright https://en.wikipedia.org/wiki/Central_Park https://en.wikipedia.org/wiki/Daniel_Berrigan |
https://en.wikipedia.org/wiki/Copyright_infringement | https://en.wikipedia.org/wiki/Ky_Ebright https://en.wikipedia.org/wiki/The_Omen https://en.wikipedia.org/wiki/The_Gunfighter |
https://en.wikipedia.org/wiki/Cryptography#cite_note-AACS-9 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-90 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-6 |
Terminology | |
The first use of the term |
|
https://en.wikipedia.org/wiki/The_Gold-Bug | https://en.wikipedia.org/wiki/The_Omen https://en.wikipedia.org/wiki/The_Gunfighter https://en.wikipedia.org/wiki/Goliath |
https://en.wikipedia.org/wiki/Edgar_Allan_Poe | https://en.wikipedia.org/wiki/Alabama https://en.wikipedia.org/wiki/Korean_War https://en.wikipedia.org/wiki/Edward_Pawley |
https://en.wikipedia.org/wiki/Cryptography#cite_note-10 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-103 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-1 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-19 |
10 | |
Until modern times, cryptography referred almost exclusively to | |
https://en.wikipedia.org/wiki/Plaintext | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Alabama |
https://en.wikipedia.org/wiki/Ciphertext | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Anne_Baxter |
https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-1 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-19 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-18 |
11 | |
Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. | |
A | |
https://en.wikipedia.org/wiki/Cipher | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
The detailed operation of a cipher is controlled both by the algorithm and in each instance by a “ |
|
https://en.wikipedia.org/wiki/Key_(cryptography) | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
The key is a secret (ideally known only to the communicants), usually a short string of characters, which is needed to decrypt the ciphertext. | |
Formally, a “ |
|
https://en.wikipedia.org/wiki/Cryptosystem | https://en.wikipedia.org/wiki/Studio_system https://en.wikipedia.org/wiki/Ghost_town https://en.wikipedia.org/wiki/MGM |
Keys are important both formally and in actual practice, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. | |
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as | |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Bathsheba https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/Antisemitism |
There are two kinds of cryptosystems: | |
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/Pre-medical https://en.wikipedia.org/wiki/Stanley_Kramer |
https://en.wikipedia.org/wiki/Public-key_cryptography | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
In symmetric systems the same key (the secret key) is used to encrypt and decrypt a message. | |
Data manipulation in symmetric systems is faster than asymmetric systems as they generally use shorter key lengths. | |
Asymmetric systems use a public key to encrypt a message and a private key to decrypt it. | |
Use of asymmetric systems enhances the security of communication. | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-12 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-12 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-126 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-125 |
12 | |
Examples of asymmetric systems include RSA ( |
|
https://en.wikipedia.org/wiki/Rivest-Shamir-Adleman | https://en.wikipedia.org/wiki/Alabama https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography | https://en.wikipedia.org/wiki/Catholic_Church https://en.wikipedia.org/wiki/Elia_Kazan https://en.wikipedia.org/wiki/Vatican_City |
Symmetric models include the commonly used AES ( |
|
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/Zoltan_Korda https://en.wikipedia.org/wiki/Ava_Gardner https://en.wikipedia.org/wiki/Jean_Simmons |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Zoltan_Korda https://en.wikipedia.org/wiki/Darryl_Zanuck https://en.wikipedia.org/wiki/David |
https://en.wikipedia.org/wiki/Cryptography#cite_note-13 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-131 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-1 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-19 |
13 | |
In | |
https://en.wikipedia.org/wiki/Colloquial | https://en.wikipedia.org/wiki/Goliath https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Code_(cryptography) | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
However, in cryptography, | |
It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a | |
https://en.wikipedia.org/wiki/Code_word | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
Some use the terms | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-goldreichbook-14 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-148 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-146 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-145 |
14 | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-websters-15 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-15 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-156 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-152 |
15 | |
English is more flexible than several other languages in which | |
https://en.wikipedia.org/wiki/Request_for_Comments_(identifier) | https://en.wikipedia.org/wiki/Jacques_Chirac https://en.wikipedia.org/wiki/Jennifer_Jones https://en.wikipedia.org/wiki/Robert_Bork |
https://tools.ietf.org/html/rfc2828 | |
https://en.wikipedia.org/wiki/Steganography | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Stanley_Kramer |
https://en.wikipedia.org/wiki/Cryptography#cite_note-16 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-169 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-168 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-167 |
16 | |
The study of characteristics of languages that have some application in cryptography or cryptology (e.g. frequency data, letter combinations, universal patterns, etc.) is called cryptolinguistics. | |
History of Cryptography | |
Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of | |
https://en.wikipedia.org/wiki/Information | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Norman_Jewison |
Encryption attempted to ensure | |
https://en.wikipedia.org/wiki/Secrecy | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Communications | https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Spy | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Diplomat | https://en.wikipedia.org/wiki/David https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity | |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Bathsheba https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/Antisemitism |
https://en.wikipedia.org/wiki/Digital_signature | https://en.wikipedia.org/wiki/David https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Interactive_proof_system | https://en.wikipedia.org/wiki/Studio_system https://en.wikipedia.org/wiki/Anne_Baxter https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Secure_multiparty_computation | https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Second_World_War https://en.wikipedia.org/wiki/Barker_(occupation) |
Computer era | |
Prior to the early 20th century, cryptography was mainly concerned with | |
https://en.wikipedia.org/wiki/Language | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/La_Jolla |
https://en.wikipedia.org/wiki/Lexicographic_code | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of | |
https://en.wikipedia.org/wiki/Information_theory | https://en.wikipedia.org/wiki/Norman_Jewison https://en.wikipedia.org/wiki/Bathsheba https://en.wikipedia.org/wiki/Goliath |
https://en.wikipedia.org/wiki/Computational_complexity_theory | https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Father_Mapple https://en.wikipedia.org/wiki/Sorority |
https://en.wikipedia.org/wiki/Statistics | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Nazism |
https://en.wikipedia.org/wiki/Combinatorics | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Abstract_algebra | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Central_Park |
https://en.wikipedia.org/wiki/Number_theory | https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Father_Mapple https://en.wikipedia.org/wiki/MGM |
Cryptography is also a branch of | |
https://en.wikipedia.org/wiki/Engineering | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Easter_Rising |
https://en.wikipedia.org/wiki/Security_engineering | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/MGM |
There is also active research examining the relationship between cryptographic problems and | |
https://en.wikipedia.org/wiki/Quantum_physics | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Cary_Grant |
https://en.wikipedia.org/wiki/Quantum_cryptography | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Quantum_computer | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Gun_control |
Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. | |
Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. | |
Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. | |
Many computer ciphers can be characterized by their operation on | |
https://en.wikipedia.org/wiki/Binary_numeral_system | https://en.wikipedia.org/wiki/Studio_system https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/Central_Park |
binary | |
https://en.wikipedia.org/wiki/Bit | https://en.wikipedia.org/wiki/BAFTA https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
However, computers have also assisted cryptanalysis, which has compensated to some extent for increased cipher complexity. | |
Nonetheless, good modern ciphers have stayed ahead of cryptanalysis; it is typically the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources, such as memory or CPU capability), while breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible. | |
Advent of modern cryptography | |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
In the United Kingdom, cryptanalytic efforts at | |
https://en.wikipedia.org/wiki/Bletchley_Park | https://en.wikipedia.org/wiki/Edward_Pawley https://en.wikipedia.org/wiki/Central_Park https://en.wikipedia.org/wiki/BAFTA |
This culminated in the development of the | |
https://en.wikipedia.org/wiki/Colossus_computer | https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Computer_programming | https://en.wikipedia.org/wiki/Easter_Rising https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Lorenz_SZ40/42 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Korean_War |
Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s. | |
In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) | |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Zoltan_Korda https://en.wikipedia.org/wiki/Darryl_Zanuck https://en.wikipedia.org/wiki/David |
https://en.wikipedia.org/wiki/Whitfield_Diffie | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Moby_Dick |
https://en.wikipedia.org/wiki/Martin_Hellman | https://en.wikipedia.org/wiki/Martin_Balsam https://en.wikipedia.org/wiki/Martin_Scorsese https://en.wikipedia.org/wiki/Mark_Twain |
https://en.wikipedia.org/wiki/Diffie-Hellman | https://en.wikipedia.org/wiki/Herman_Melville https://en.wikipedia.org/wiki/David https://en.wikipedia.org/wiki/AllMovie |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-309 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-304 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-303 |
30 | |
and the | |
https://en.wikipedia.org/wiki/RSA_(algorithm) | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Martin_Gardner | https://en.wikipedia.org/wiki/Ava_Gardner https://en.wikipedia.org/wiki/Martin_Balsam https://en.wikipedia.org/wiki/Martin_Scorsese |
https://en.wikipedia.org/wiki/Scientific_American | https://en.wikipedia.org/wiki/American_Cancer_Society https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/American_Film_Institute |
Following their work in 1976, it became popular to consider cryptography systems based on mathematical problems that are easy to state but have been found difficult to solve. | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-31 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-318 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-317 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-316 |
31 | |
Since then, cryptography has become a widely used tool in communications, | |
https://en.wikipedia.org/wiki/Computer_network | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Robert_Bork |
https://en.wikipedia.org/wiki/Computer_security | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
Some modern cryptographic techniques can only keep their keys secret if certain mathematical problems are | |
https://en.wikipedia.org/wiki/Computational_complexity_theory#Intractability | https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Central_Park https://en.wikipedia.org/wiki/Only_the_Valiant |
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Barker_(occupation) https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/Peter_von_Bagh |
https://en.wikipedia.org/wiki/Discrete_logarithm | https://en.wikipedia.org/wiki/David https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Abstract_mathematics | https://en.wikipedia.org/wiki/Bathsheba https://en.wikipedia.org/wiki/Alabama https://en.wikipedia.org/wiki/Goliath |
There are very few cryptosystems that are proven to be unconditionally secure. | |
The | |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/The_Omen https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
There are a few important algorithms that have been proven secure under certain assumptions. | |
For example, the infeasibility of factoring extremely large integers is the basis for believing that | |
https://en.wikipedia.org/wiki/RSA_(cryptosystem) | https://en.wikipedia.org/wiki/Studio_system https://en.wikipedia.org/wiki/Ghost_town https://en.wikipedia.org/wiki/MGM |
In practice, these are widely used, and are believed unbreakable in practice by most competent observers. | |
There are systems similar to RSA, such as one by | |
https://en.wikipedia.org/wiki/Michael_O._Rabin | https://en.wikipedia.org/wiki/Michael_Freedland https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/Mel_Ferrer |
The | |
https://en.wikipedia.org/wiki/Discrete_logarithm_problem | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/David https://en.wikipedia.org/wiki/Vietnam_War |
https://en.wikipedia.org/wiki/Cryptography#cite_note-32 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-326 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-325 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-3 |
32 | |
As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs. | |
For instance, continuous improvements in computer processing power have increased the scope of | |
https://en.wikipedia.org/wiki/Brute-force_attack | https://en.wikipedia.org/wiki/BAFTA https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Key_length | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Goliath |
https://en.wikipedia.org/wiki/Cryptography#cite_note-fortify-33 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-339 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-335 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-3 |
33 | |
The potential effects of | |
https://en.wikipedia.org/wiki/Quantum_computing | https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Post-quantum_cryptography | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/Ghost_town https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-47 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-42 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
Symmetric-key cryptography | |
Main article: |
|
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/Pre-medical https://en.wikipedia.org/wiki/Stanley_Kramer |
https://en.wikipedia.org/wiki/File:Symmetric_key_encryption.svg | https://en.wikipedia.org/wiki/Atticus_Finch https://en.wikipedia.org/wiki/Stanley_Kramer https://en.wikipedia.org/wiki/The_Omen |
https://upload.wikimedia.org/wikipedia/commons/thumb/2/27/Symmetric_key_encryption.svg/250px-Symmetric_key_encryption.svg.png | |
diagram showing encrypt with a key and decrypt process | |
Symmetric-key cryptography, where a single key is used for encryption and decryption | |
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). | |
This was the only kind of encryption publicly known until June 1976. | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-309 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-304 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-303 |
30 | |
https://en.wikipedia.org/wiki/File:International_Data_Encryption_Algorithm_InfoBox_Diagram.svg | |
https://upload.wikimedia.org/wikipedia/commons/thumb/a/af/International_Data_Encryption_Algorithm_InfoBox_Diagram.svg/220px-International_Data_Encryption_Algorithm_InfoBox_Diagram.svg.png | |
logic diagram showing International Data Encryption Algorithm cypher process | |
One round (out of 8.5) of the |
|
https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm | https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Captain_Horatio_Hornblower https://en.wikipedia.org/wiki/Bob_Dornan |
https://en.wikipedia.org/wiki/Pretty_Good_Privacy | https://en.wikipedia.org/wiki/Sorority https://en.wikipedia.org/wiki/Pre-medical https://en.wikipedia.org/wiki/MGM |
Symmetric key ciphers are implemented as either | |
https://en.wikipedia.org/wiki/Block_ciphers | https://en.wikipedia.org/wiki/BAFTA https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
https://en.wikipedia.org/wiki/Stream_ciphers | https://en.wikipedia.org/wiki/Barter_Theatre https://en.wikipedia.org/wiki/Sam_Jaffe https://en.wikipedia.org/wiki/MGM |
A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher. | |
The | |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Zoltan_Korda https://en.wikipedia.org/wiki/Darryl_Zanuck https://en.wikipedia.org/wiki/David |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/Zoltan_Korda https://en.wikipedia.org/wiki/Ava_Gardner https://en.wikipedia.org/wiki/Jean_Simmons |
https://en.wikipedia.org/wiki/Cryptography_standards | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/Captain_Ahab https://en.wikipedia.org/wiki/Zoltan_Korda |
https://en.wikipedia.org/wiki/Cryptography#cite_note-aes-34 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-34 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-347 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-346 |
34 | |
Despite its deprecation as an official standard, DES (especially its still-approved and much more secure | |
https://en.wikipedia.org/wiki/Triple-DES | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Cryptography#cite_note-atm-35 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-35 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-359 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-358 |
35 | |
to | |
https://en.wikipedia.org/wiki/E-mail_privacy | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Alabama |
e-mail privacy | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-opgp-36 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-363 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-362 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-3 |
36 | |
and | |
https://en.wikipedia.org/wiki/Secure_Shell | https://en.wikipedia.org/wiki/Yellow_Sky https://en.wikipedia.org/wiki/The_Omen https://en.wikipedia.org/wiki/MGM |
https://en.wikipedia.org/wiki/Cryptography#cite_note-ssh-37 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-3 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-35 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-34 |
37 | |
Many other block ciphers have been designed and released, with considerable variation in quality. | |
Many, even some designed by capable practitioners, have been thoroughly broken, such as | |
https://en.wikipedia.org/wiki/FEAL | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-47 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-42 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-schneierbook-38 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-389 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-388 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-387 |
38 | |
Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the | |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/The_Omen https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
In a stream cipher, the output stream is created based on a hidden internal state that changes as the cipher operates. | |
That internal state is initially set up using the secret key material. | |
https://en.wikipedia.org/wiki/RC4 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Category:Stream_ciphers | https://en.wikipedia.org/wiki/Barter_Theatre https://en.wikipedia.org/wiki/Korean_War https://en.wikipedia.org/wiki/Cary_Grant |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-47 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-42 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
https://en.wikipedia.org/wiki/Block_cipher_modes_of_operation | https://en.wikipedia.org/wiki/Barker_(occupation) https://en.wikipedia.org/wiki/Barter_Theatre https://en.wikipedia.org/wiki/Mayor_of_Boston |
https://en.wikipedia.org/wiki/Cryptographic_hash_functions | https://en.wikipedia.org/wiki/Captain_Ahab https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/Charlton_Heston |
They take a message of any length as input, and output a short, fixed length | |
https://en.wikipedia.org/wiki/Hash_function | https://en.wikipedia.org/wiki/High_Noon https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
For good hash functions, an attacker cannot find two messages that produce the same hash. | |
https://en.wikipedia.org/wiki/MD4 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/MD5 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
The US | |
https://en.wikipedia.org/wiki/National_Security_Agency | https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/U.S._Senate https://en.wikipedia.org/wiki/National_Board_of_Review |
https://en.wikipedia.org/wiki/SHA-1 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/SHA-2 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology | https://en.wikipedia.org/wiki/National_Board_of_Review https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Navarone_Island |
https://en.wikipedia.org/wiki/Cryptography#cite_note-39 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-397 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-395 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-394 |
39 | |
Thus, a | |
https://en.wikipedia.org/wiki/NIST_hash_function_competition | https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Thomas_Ashe |
https://en.wikipedia.org/wiki/SHA-3 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
The competition ended on October 2, 2012 when the NIST announced that | |
https://en.wikipedia.org/wiki/Keccak | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
https://en.wikipedia.org/wiki/Cryptography#cite_note-40 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-47 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-42 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
40 | |
Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. | |
Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security. | |
https://en.wikipedia.org/wiki/Message_authentication_code | https://en.wikipedia.org/wiki/Gun_control https://en.wikipedia.org/wiki/Vatican_City https://en.wikipedia.org/wiki/The_Omen |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-47 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-42 https://en.wikipedia.org/wiki/Gregory_Peck#cite_note-7 |
https://en.wikipedia.org/wiki/Md5 | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/BAFTA |
Modern cryptography | |
The modern field of cryptography can be divided into several areas of study. | |
The chief ones are discussed here; see | |
https://en.wikipedia.org/wiki/Topics_in_Cryptography | https://en.wikipedia.org/wiki/Captain_Ahab https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC |
Public-key cryptography | |
https://en.wikipedia.org/wiki/File:Public_key_encryption.svg | https://en.wikipedia.org/wiki/Atticus_Finch https://en.wikipedia.org/wiki/Henry_Scagnoli https://en.wikipedia.org/wiki/File:Peck_Niven_1961.jpg |
https://upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Public_key_encryption.svg/250px-Public_key_encryption.svg.png | |
diagram of Public-key cryptography showing public key and private key | |
Public-key cryptography, where different keys are used for encryption and decryption. | |
Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others. | |
A significant disadvantage of symmetric ciphers is the | |
https://en.wikipedia.org/wiki/Key_management | https://en.wikipedia.org/wiki/Cary_Grant https://en.wikipedia.org/wiki/The_Omen https://en.wikipedia.org/wiki/MGM |
Each distinct pair of communicating parties must, ideally, share a different key, and perhaps for each ciphertext exchanged as well. | |
The number of keys required increases as the | |
https://en.wikipedia.org/wiki/Square_(algebra) | https://en.wikipedia.org/wiki/MGM https://en.wikipedia.org/wiki/NBC https://en.wikipedia.org/wiki/Central_Park |
https://en.wikipedia.org/wiki/File:Diffie_and_Hellman.jpg | https://en.wikipedia.org/wiki/File:Spellbound-1945.jpg https://en.wikipedia.org/wiki/Herman_Melville https://en.wikipedia.org/wiki/Jane_Wyman |
https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/Diffie_and_Hellman.jpg/220px-Diffie_and_Hellman.jpg | |
headshots of Whitfield Diffie and Martin Hellman |