TM completed segments: 0
Other segments: 440
TM completed words: 0
Other words: 3922
Original | Translated |
---|
Original | Similar TM records |
---|---|
Introduction to Cryptography | |
Cryptography | |
Cryptography or cryptology (from | |
https://en.wikipedia.org/wiki/Ancient_Greek_language | https://en.wikipedia.org/wiki/Ancient_Egypt https://en.wikipedia.org/wiki/Na%27vi_language https://en.wikipedia.org/wiki/Jean_Grey |
https://en.wikipedia.org/wiki/Cryptography#cite_note-1 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-10 |
https://en.wikipedia.org/wiki/Secure_communication | https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/Sentinel_(comics) https://en.wikipedia.org/wiki/Communist_Poland |
https://en.wikipedia.org/wiki/Adversary_(cryptography) | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-rivest90-2 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-29 |
https://en.wikipedia.org/wiki/Communications_protocol | https://en.wikipedia.org/wiki/Communist_Poland https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/X-Mansion |
https://en.wikipedia.org/wiki/Cryptography#cite_note-modern-crypto-3 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Information_security | https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London |
https://en.wikipedia.org/wiki/Confidentiality | https://en.wikipedia.org/wiki/Montreal https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Data_integrity | https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 https://en.wikipedia.org/wiki/Avatar_3 |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Telepathic https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Non-repudiation | https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/Montreal https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Mathematics | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Telepathic https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Computer_science | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Ancient_Egypt |
https://en.wikipedia.org/wiki/Electrical_engineering | https://en.wikipedia.org/wiki/Genetic_engineering https://en.wikipedia.org/wiki/Telekinetic https://en.wikipedia.org/wiki/Astral_plane |
https://en.wikipedia.org/wiki/Communication_science | https://en.wikipedia.org/wiki/Science_fiction_film https://en.wikipedia.org/wiki/Communist_Poland https://en.wikipedia.org/wiki/Motion_capture |
https://en.wikipedia.org/wiki/Physics | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Psylocke |
Applications of cryptography include |
|
A |
|
https://en.wikipedia.org/wiki/Electronic_commerce | https://en.wikipedia.org/wiki/Epic_film https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/James_Cameron |
https://en.wikipedia.org/wiki/Credit_card_chip | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Digital_currencies | https://en.wikipedia.org/wiki/Weta_Digital https://en.wikipedia.org/wiki/Telepresence https://en.wikipedia.org/wiki/Ancient_Egypt |
https://en.wikipedia.org/wiki/Password | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Psylocke |
https://en.wikipedia.org/wiki/Military_communications | https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
Cryptography prior to the modern age was effectively synonymous with | |
https://en.wikipedia.org/wiki/Encryption | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/X-Mansion |
https://en.wikipedia.org/wiki/Nonsense | https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London |
The originator of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. |
|
A |
|
A |
|
https://en.wikipedia.org/wiki/Alice_and_Bob | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/Jon_Landau |
https://en.wikipedia.org/wiki/Eavesdropper | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/East_Berlin |
https://en.wikipedia.org/wiki/Cryptography#cite_note-codesintro-5 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Rotor_machine | https://en.wikipedia.org/wiki/Rose_Byrne https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Dolby_Cinema |
https://en.wikipedia.org/wiki/World_War_I | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Computer | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weather |
https://en.wikipedia.org/wiki/World_War_II | https://en.wikipedia.org/wiki/Warren_Worthington_III https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic | |
https://en.wikipedia.org/wiki/Algorithm | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Computational_hardness_assumption | https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 https://en.wikipedia.org/wiki/Avatar_3 |
A |
|
A |
|
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
A |
|
https://en.wikipedia.org/wiki/Information_theoretic_security | https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Teleportation_in_fiction |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Rose_Byrne https://en.wikipedia.org/wiki/X-Men |
The growth of cryptographic technology has raised a number of legal issues in the information age. Cryptography’s potential for use as a tool for | The growth of cryptographic technology has raised a number of legal issues in the information age. |
A |
|
https://en.wikipedia.org/wiki/Espionage | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/Epic_film |
https://en.wikipedia.org/wiki/Sedition | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/X-Mansion |
https://en.wikipedia.org/wiki/Cryptography#cite_note-cryptolaw-6 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Key_disclosure_law | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Jean_Grey https://en.wikipedia.org/wiki/Cerebro |
https://en.wikipedia.org/wiki/Cryptography#cite_note-UK_law-7 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-RangerSteve1-8 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-autogenerated2-14 |
https://en.wikipedia.org/wiki/Digital_rights_management | https://en.wikipedia.org/wiki/Weta_Digital https://en.wikipedia.org/wiki/Gas_giant https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Copyright_infringement | https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Bryan_Singer |
https://en.wikipedia.org/wiki/Cryptography#cite_note-AACS-9 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
Terminology | |
The first use of the term |
|
https://en.wikipedia.org/wiki/The_Gold-Bug | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Tye_Sheridan https://en.wikipedia.org/wiki/Weather |
https://en.wikipedia.org/wiki/Edgar_Allan_Poe | https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 https://en.wikipedia.org/wiki/Avatar_3 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-10 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-10 https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 |
10 | |
Until modern times, cryptography referred almost exclusively to | |
https://en.wikipedia.org/wiki/Plaintext | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Psylocke |
https://en.wikipedia.org/wiki/Ciphertext | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-10 |
11 | |
Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A | Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. |
A |
|
https://en.wikipedia.org/wiki/Cipher | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/4DX |
A |
|
https://en.wikipedia.org/wiki/Key_(cryptography) | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men |
A |
|
A |
|
https://en.wikipedia.org/wiki/Cryptosystem | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/X-Men |
A |
|
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as | |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Telepathic https://en.wikipedia.org/wiki/X-Men |
A |
|
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/Montreal https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weta_Digital |
https://en.wikipedia.org/wiki/Public-key_cryptography | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Psylocke https://en.wikipedia.org/wiki/4DX |
A |
|
A |
|
A |
|
A |
|
https://en.wikipedia.org/wiki/Cryptography#cite_note-12 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-10 |
12 | |
Examples of asymmetric systems include RSA ( |
Symmetric models include the commonly used AES ( Examples of asymmetric systems include RSA ( |
https://en.wikipedia.org/wiki/Rivest-Shamir-Adleman | https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Epic_film https://en.wikipedia.org/wiki/Wellington |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/Jon_Landau https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Jon_Landau https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-13 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-10 |
13 | |
In | |
https://en.wikipedia.org/wiki/Colloquial | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Code_(cryptography) | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro |
It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a |
|
A |
|
https://en.wikipedia.org/wiki/Code_word | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Mansion https://en.wikipedia.org/wiki/Cerebro |
Some use the terms | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-goldreichbook-14 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-10 |
14 | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-websters-15 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-Reuters-25 |
15 | |
English is more flexible than several other languages in which | |
https://en.wikipedia.org/wiki/Request_for_Comments_(identifier) | https://en.wikipedia.org/wiki/James_Cameron https://en.wikipedia.org/wiki/Mystique_(film_character) https://en.wikipedia.org/wiki/X-Men_(film_series) |
https://tools.ietf.org/html/rfc2828 | |
https://en.wikipedia.org/wiki/Steganography | https://en.wikipedia.org/wiki/Stephen_Lang https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Cryptography#cite_note-16 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-10 |
16 | |
The study of characteristics of languages that have some application in cryptography or cryptology (e.g. frequency data, letter combinations, universal patterns, etc.) is called cryptolinguistics. | |
History of Cryptography | |
Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of | |
https://en.wikipedia.org/wiki/Information | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/X-Mansion |
A |
|
https://en.wikipedia.org/wiki/Secrecy | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Communications | https://en.wikipedia.org/wiki/Communist_Poland https://en.wikipedia.org/wiki/X-Mansion https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Spy | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/London |
https://en.wikipedia.org/wiki/Diplomat | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/X-Men |
In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity |
|
A |
|
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Telepathic https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Digital_signature | https://en.wikipedia.org/wiki/Weta_Digital https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Interactive_proof_system | https://en.wikipedia.org/wiki/Mystique_(film_character) https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Secure_multiparty_computation | https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
Computer era | |
Prior to the early 20th century, cryptography was mainly concerned with | |
https://en.wikipedia.org/wiki/Language | https://en.wikipedia.org/wiki/Na%27vi_language https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London |
https://en.wikipedia.org/wiki/Lexicographic_code | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/Epic_film |
Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of |
|
A |
|
https://en.wikipedia.org/wiki/Information_theory | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Motion_capture |
https://en.wikipedia.org/wiki/Computational_complexity_theory | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/3D_television https://en.wikipedia.org/wiki/Telepathic |
https://en.wikipedia.org/wiki/Statistics | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Combinatorics | https://en.wikipedia.org/wiki/Marvel_Comics https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro |
https://en.wikipedia.org/wiki/Abstract_algebra | https://en.wikipedia.org/wiki/Astral_plane https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/Montreal |
https://en.wikipedia.org/wiki/Number_theory | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro |
A |
|
https://en.wikipedia.org/wiki/Engineering | https://en.wikipedia.org/wiki/Genetic_engineering https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/East_Berlin |
https://en.wikipedia.org/wiki/Security_engineering | https://en.wikipedia.org/wiki/Genetic_engineering https://en.wikipedia.org/wiki/Sophie_Turner https://en.wikipedia.org/wiki/Sigourney_Weaver |
A |
|
https://en.wikipedia.org/wiki/Quantum_physics | https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Gas_giant |
https://en.wikipedia.org/wiki/Quantum_cryptography | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/Motion_capture |
https://en.wikipedia.org/wiki/Quantum_computer | https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Gas_giant |
Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. Many computer ciphers can be characterized by their operation on | Nonetheless, good modern ciphers have stayed ahead of cryptanalysis; it is typically the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources, such as memory or CPU capability), while breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible. |
A |
|
A |
|
A |
|
https://en.wikipedia.org/wiki/Binary_numeral_system | https://en.wikipedia.org/wiki/Astral_plane https://en.wikipedia.org/wiki/Bryan_Singer https://en.wikipedia.org/wiki/East_Berlin |
binary | |
https://en.wikipedia.org/wiki/Bit | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/London |
Nonetheless, good modern ciphers have stayed ahead of cryptanalysis; it is typically the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources, such as memory or CPU capability), while breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible. |
|
A |
|
A |
|
Advent of modern cryptography | |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Mansion https://en.wikipedia.org/wiki/Cerebro |
A |
|
https://en.wikipedia.org/wiki/Bletchley_Park | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Avatar_5 |
A |
|
https://en.wikipedia.org/wiki/Colossus_computer | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weather |
https://en.wikipedia.org/wiki/Computer_programming | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Bryan_Singer |
https://en.wikipedia.org/wiki/Lorenz_SZ40/42 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/X-Men |
Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s. In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) | Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s. In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) |
A |
|
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Jon_Landau https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Whitfield_Diffie | https://en.wikipedia.org/wiki/Weta_Digital https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/4D_film |
https://en.wikipedia.org/wiki/Martin_Hellman | https://en.wikipedia.org/wiki/Wellington https://en.wikipedia.org/wiki/Marvel_Comics https://en.wikipedia.org/wiki/Humanoid |
https://en.wikipedia.org/wiki/Diffie-Hellman | https://en.wikipedia.org/wiki/4D_film https://en.wikipedia.org/wiki/3D_film https://en.wikipedia.org/wiki/Humanoid |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
30 | |
and the | |
https://en.wikipedia.org/wiki/RSA_(algorithm) | https://en.wikipedia.org/wiki/RealD_3D https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weather |
https://en.wikipedia.org/wiki/Martin_Gardner | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Telekinetic https://en.wikipedia.org/wiki/Jean_Grey |
https://en.wikipedia.org/wiki/Scientific_American | https://en.wikipedia.org/wiki/Science_fiction_film https://en.wikipedia.org/wiki/Epic_film https://en.wikipedia.org/wiki/Ancient_Egypt |
Following their work in 1976, it became popular to consider cryptography systems based on mathematical problems that are easy to state but have been found difficult to solve. |
|
A |
|
https://en.wikipedia.org/wiki/Cryptography#cite_note-31 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
31 | |
Since then, cryptography has become a widely used tool in communications, | |
https://en.wikipedia.org/wiki/Computer_network | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Peter_Maximoff |
https://en.wikipedia.org/wiki/Computer_security | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weather |
Some modern cryptographic techniques can only keep their keys secret if certain mathematical problems are |
|
A |
|
https://en.wikipedia.org/wiki/Computational_complexity_theory#Intractability | https://en.wikipedia.org/wiki/Auschwitz_concentration_camp |
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Discrete_logarithm | https://en.wikipedia.org/wiki/Dan_Harris_(screenwriter) https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weta_Digital |
https://en.wikipedia.org/wiki/Abstract_mathematics | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Astral_plane https://en.wikipedia.org/wiki/Telepathic |
There are very few cryptosystems that are proven to be unconditionally secure. |
|
A |
|
A |
|
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Rose_Byrne https://en.wikipedia.org/wiki/X-Men |
A |
|
A |
|
https://en.wikipedia.org/wiki/RSA_(cryptosystem) | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Rose_Byrne https://en.wikipedia.org/wiki/X-Men |
A |
|
A |
|
https://en.wikipedia.org/wiki/Michael_O._Rabin | https://en.wikipedia.org/wiki/Michael_Dougherty https://en.wikipedia.org/wiki/Michael_Fassbender https://en.wikipedia.org/wiki/Michelle_Rodriguez |
A |
|
https://en.wikipedia.org/wiki/Discrete_logarithm_problem | https://en.wikipedia.org/wiki/Dan_Harris_(screenwriter) https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/Habitable_moon |
https://en.wikipedia.org/wiki/Cryptography#cite_note-32 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
32 | |
As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs. For instance, continuous improvements in computer processing power have increased the scope of | As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs. |
A |
|
https://en.wikipedia.org/wiki/Brute-force_attack | https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 https://en.wikipedia.org/wiki/Avatar_3 |
https://en.wikipedia.org/wiki/Key_length | https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weather |
https://en.wikipedia.org/wiki/Cryptography#cite_note-fortify-33 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
33 | |
The potential effects of | |
https://en.wikipedia.org/wiki/Quantum_computing | https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Sentinel_(comics) |
https://en.wikipedia.org/wiki/Post-quantum_cryptography | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/Motion_capture |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
Symmetric-key cryptography | |
Main article: |
|
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/Montreal https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Weta_Digital |
https://en.wikipedia.org/wiki/File:Symmetric_key_encryption.svg | https://en.wikipedia.org/wiki/Genetic_engineering https://en.wikipedia.org/wiki/Science_fiction_film https://en.wikipedia.org/wiki/Telekinetic |
https://upload.wikimedia.org/wikipedia/commons/thumb/2/27/Symmetric_key_encryption.svg/250px-Symmetric_key_encryption.svg.png | |
diagram showing encrypt with a key and decrypt process | |
Symmetric-key cryptography, where a single key is used for encryption and decryption | |
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976. | Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). |
A |
|
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
30 | |
https://en.wikipedia.org/wiki/File:International_Data_Encryption_Algorithm_InfoBox_Diagram.svg | |
https://upload.wikimedia.org/wikipedia/commons/thumb/a/af/International_Data_Encryption_Algorithm_InfoBox_Diagram.svg/220px-International_Data_Encryption_Algorithm_InfoBox_Diagram.svg.png | |
logic diagram showing International Data Encryption Algorithm cypher process | |
One round (out of 8.5) of the |
|
https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm | https://en.wikipedia.org/wiki/Teleportation_in_fiction https://en.wikipedia.org/wiki/Fictional_universe_of_Avatar https://en.wikipedia.org/wiki/Weta_Digital |
https://en.wikipedia.org/wiki/Pretty_Good_Privacy | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Jean_Grey https://en.wikipedia.org/wiki/Cerebro |
Symmetric key ciphers are implemented as either | |
https://en.wikipedia.org/wiki/Block_ciphers | https://en.wikipedia.org/wiki/Psylocke https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/Stream_ciphers | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Montreal https://en.wikipedia.org/wiki/Stephen_Lang |
A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher. |
|
A |
|
The | |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Jon_Landau https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/Jon_Landau https://en.wikipedia.org/wiki/Avatar_5 https://en.wikipedia.org/wiki/Avatar_4 |
https://en.wikipedia.org/wiki/Cryptography_standards | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Jon_Landau https://en.wikipedia.org/wiki/Avatar_5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-aes-34 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
34 | |
Despite its deprecation as an official standard, DES (especially its still-approved and much more secure | |
https://en.wikipedia.org/wiki/Triple-DES | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Telepathic https://en.wikipedia.org/wiki/X-Men |
https://en.wikipedia.org/wiki/Cryptography#cite_note-atm-35 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
35 | |
to | |
https://en.wikipedia.org/wiki/E-mail_privacy | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Epic_film https://en.wikipedia.org/wiki/4D_film |
e-mail privacy | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-opgp-36 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
36 | |
and | |
https://en.wikipedia.org/wiki/Secure_Shell | https://en.wikipedia.org/wiki/Tye_Sheridan https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Cerebro |
https://en.wikipedia.org/wiki/Cryptography#cite_note-ssh-37 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
37 | |
Many other block ciphers have been designed and released, with considerable variation in quality. Many, even some designed by capable practitioners, have been thoroughly broken, such as | Many other block ciphers have been designed and released, with considerable variation in quality. Many, even some designed by capable practitioners, have been thoroughly broken, such as |
A |
|
https://en.wikipedia.org/wiki/FEAL | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/London |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-schneierbook-38 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Sophie_Turner |
38 | |
Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the | |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/Rose_Byrne https://en.wikipedia.org/wiki/X-Men |
In a stream cipher, the output stream is created based on a hidden internal state that changes as the cipher operates. |
|
A |
|
A |
|
https://en.wikipedia.org/wiki/RC4 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/RealD_3D |
https://en.wikipedia.org/wiki/Category:Stream_ciphers | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/Montreal |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Block_cipher_modes_of_operation | https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Psylocke https://en.wikipedia.org/wiki/James_Cameron |
https://en.wikipedia.org/wiki/Cryptographic_hash_functions | https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/Science_fiction_film https://en.wikipedia.org/wiki/Epic_film |
A |
|
https://en.wikipedia.org/wiki/Hash_function | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/London https://en.wikipedia.org/wiki/X-Mansion |
For good hash functions, an attacker cannot find two messages that produce the same hash. |
|
A |
|
https://en.wikipedia.org/wiki/MD4 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Montreal |
https://en.wikipedia.org/wiki/MD5 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Montreal |
A |
|
https://en.wikipedia.org/wiki/National_Security_Agency | https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Montreal https://en.wikipedia.org/wiki/Motion_capture |
https://en.wikipedia.org/wiki/SHA-1 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/London |
https://en.wikipedia.org/wiki/SHA-2 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/London |
https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology | https://en.wikipedia.org/wiki/Fictional_universe_of_Avatar#Astronomy_and_geology https://en.wikipedia.org/wiki/Fictional_universe_of_Avatar |
https://en.wikipedia.org/wiki/Cryptography#cite_note-39 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
39 | |
Thus, a | |
https://en.wikipedia.org/wiki/NIST_hash_function_competition | https://en.wikipedia.org/wiki/Teleportation_in_fiction https://en.wikipedia.org/wiki/Auschwitz_concentration_camp https://en.wikipedia.org/wiki/Motion_capture |
https://en.wikipedia.org/wiki/SHA-3 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/London |
The competition ended on October 2, 2012 when the NIST announced that |
|
A |
|
https://en.wikipedia.org/wiki/Keccak | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/London |
https://en.wikipedia.org/wiki/Cryptography#cite_note-40 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
40 | |
Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security. | Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security. |
A |
|
https://en.wikipedia.org/wiki/Message_authentication_code | https://en.wikipedia.org/wiki/Motion_capture https://en.wikipedia.org/wiki/Weather https://en.wikipedia.org/wiki/Auschwitz_concentration_camp |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/X-Men:_Apocalypse#cite_note-5 https://en.wikipedia.org/wiki/Avatar_(2009_film)#cite_note-6 |
https://en.wikipedia.org/wiki/Md5 | https://en.wikipedia.org/wiki/4DX https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Montreal |
Modern cryptography | |
The modern field of cryptography can be divided into several areas of study. The chief ones are discussed here; see | The modern field of cryptography can be divided into several areas of study. |
A |
|
https://en.wikipedia.org/wiki/Topics_in_Cryptography | https://en.wikipedia.org/wiki/Principal_photography https://en.wikipedia.org/wiki/Telekinetic https://en.wikipedia.org/wiki/4DX |
Public-key cryptography | |
https://en.wikipedia.org/wiki/File:Public_key_encryption.svg | https://en.wikipedia.org/wiki/Science_fiction_film https://en.wikipedia.org/wiki/Epic_film https://en.wikipedia.org/wiki/Ancient_Egypt |
https://upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Public_key_encryption.svg/250px-Public_key_encryption.svg.png | |
diagram of Public-key cryptography showing public key and private key | |
Public-key cryptography, where different keys are used for encryption and decryption. | |
Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others. A significant disadvantage of symmetric ciphers is the | Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others. |
A |
|
https://en.wikipedia.org/wiki/Key_management | https://en.wikipedia.org/wiki/X-Men https://en.wikipedia.org/wiki/Humanoid https://en.wikipedia.org/wiki/4DX |
Each distinct pair of communicating parties must, ideally, share a different key, and perhaps for each ciphertext exchanged as well. |
|
A |
|
A |
|
https://en.wikipedia.org/wiki/Square_(algebra) | https://en.wikipedia.org/wiki/Cerebro https://en.wikipedia.org/wiki/Montreal https://en.wikipedia.org/wiki/4DX |
https://en.wikipedia.org/wiki/File:Diffie_and_Hellman.jpg | https://en.wikipedia.org/wiki/4D_film https://en.wikipedia.org/wiki/3D_film https://en.wikipedia.org/wiki/Epic_film |
https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/Diffie_and_Hellman.jpg/220px-Diffie_and_Hellman.jpg | |
headshots of Whitfield Diffie and Martin Hellman |