TM completed segments: 0
Other segments: 312
TM completed words: 0
Other words: 3919
Original | Translated |
---|
Original | Similar TM records |
---|---|
Introduction to Cryptography | |
Cryptography | |
Cryptography or cryptology (from |
|
https://en.wikipedia.org/wiki/Ancient_Greek_language | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-1 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Secure_communication | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Adversary_(cryptography) | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-rivest90-2 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Communications_protocol | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-modern-crypto-3 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Information_security | https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Confidentiality | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Data_integrity | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Non-repudiation | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Mathematics | https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Computer_science | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Electrical_engineering | https://en.wikipedia.org/wiki/Electronic_mailing_list https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Communication_science | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Physics | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
Applications of cryptography include |
|
https://en.wikipedia.org/wiki/Electronic_commerce | https://en.wikipedia.org/wiki/Electronic_mailing_list https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Credit_card_chip | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Digital_currencies | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Password | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Military_communications | https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP |
Cryptography prior to the modern age was effectively synonymous with |
|
https://en.wikipedia.org/wiki/Encryption | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Nonsense | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Alice_and_Bob | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Eavesdropper | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-codesintro-5 | https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Rotor_machine | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/World_War_I | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Computer | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/World_War_II | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic |
|
https://en.wikipedia.org/wiki/Algorithm | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Computational_hardness_assumption | https://en.wikipedia.org/wiki/Plug-in_(computing) https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Information_theoretic_security | https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
The growth of cryptographic technology has raised a number of legal issues in the information age.
Cryptography’s potential for use as a tool for |
|
https://en.wikipedia.org/wiki/Espionage | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Sedition | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-cryptolaw-6 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Key_disclosure_law | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-UK_law-7 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Cryptography#cite_note-RangerSteve1-8 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Digital_rights_management | https://en.wikipedia.org/wiki/Learning_management_system https://en.wikipedia.org/wiki/Web_content_management_system https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Copyright_infringement | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Learning_management_system https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Cryptography#cite_note-AACS-9 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
Terminology | |
The first use of the term |
|
https://en.wikipedia.org/wiki/The_Gold-Bug | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Edgar_Allan_Poe | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-10 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
10 | |
Until modern times, cryptography referred almost exclusively to |
|
https://en.wikipedia.org/wiki/Plaintext | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Ciphertext | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
11 | |
Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
A |
|
https://en.wikipedia.org/wiki/Cipher | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Key_(cryptography) | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptosystem | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as |
|
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Public-key_cryptography | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-12 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
12 | |
Examples of asymmetric systems include RSA ( |
|
https://en.wikipedia.org/wiki/Rivest-Shamir-Adleman | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-13 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
13 | |
In |
|
https://en.wikipedia.org/wiki/Colloquial | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Code_(cryptography) | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Code_word | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
Some use the terms |
|
https://en.wikipedia.org/wiki/Cryptography#cite_note-goldreichbook-14 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-websters-15 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Web_template_system |
14 | |
15 | |
https://en.wikipedia.org/wiki/Request_for_Comments_(identifier) | https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://tools.ietf.org/html/rfc2828 | |
https://en.wikipedia.org/wiki/Steganography | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-16 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
16 | |
The study of characteristics of languages that have some application in cryptography or cryptology (e.g. frequency data, letter combinations, universal patterns, etc.) is called cryptolinguistics. | |
History of Cryptography | |
Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of |
|
https://en.wikipedia.org/wiki/Information | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Secrecy | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Communications | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Spy | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Diplomat | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Digital_signature | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Interactive_proof_system | https://en.wikipedia.org/wiki/Web_template_system https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Secure_multiparty_computation | https://en.wikipedia.org/wiki/Plug-in_(computing) https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
Computer era | |
Prior to the early 20th century, cryptography was mainly concerned with |
|
https://en.wikipedia.org/wiki/Language | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Lexicographic_code | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Information_theory | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Computational_complexity_theory | https://en.wikipedia.org/wiki/Plug-in_(computing) https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Statistics | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Combinatorics | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Abstract_algebra | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Number_theory | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Engineering | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Security_engineering | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Quantum_physics | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Quantum_cryptography | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Quantum_computer | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/Blog |
Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers.
Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant.
Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.
Many computer ciphers can be characterized by their operation on |
|
https://en.wikipedia.org/wiki/Binary_numeral_system | https://en.wikipedia.org/wiki/Learning_management_system https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/Web_template_system |
https://en.wikipedia.org/wiki/Bit | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
Advent of modern cryptography | |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Bletchley_Park | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Colossus_computer | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Computer_programming | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/Plug-in_(computing) https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Lorenz_SZ40/42 | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s.
In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) |
|
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Whitfield_Diffie | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Martin_Hellman | https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Diffie-Hellman | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
30 | |
and the |
|
https://en.wikipedia.org/wiki/RSA_(algorithm) | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Martin_Gardner | https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Scientific_American | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-31 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
31 | |
Since then, cryptography has become a widely used tool in communications, |
|
https://en.wikipedia.org/wiki/Computer_network | https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Computer_security | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Computational_complexity_theory#Intractability | |
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Internet_forum https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Discrete_logarithm | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Abstract_mathematics | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/RSA_(cryptosystem) | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Michael_O._Rabin | https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Discrete_logarithm_problem | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Cryptography#cite_note-32 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
32 | |
As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs.
For instance, continuous improvements in computer processing power have increased the scope of |
|
https://en.wikipedia.org/wiki/Brute-force_attack | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Internet_forum |
https://en.wikipedia.org/wiki/Key_length | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-fortify-33 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
33 | |
The potential effects of |
|
https://en.wikipedia.org/wiki/Quantum_computing | https://en.wikipedia.org/wiki/Plug-in_(computing) https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Post-quantum_cryptography | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
Symmetric-key cryptography | |
Main article: |
|
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
diagram showing encrypt with a key and decrypt process | |
Symmetric-key cryptography, where a single key is used for encryption and decryption | |
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976. | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
30 | |
logic diagram showing International Data Encryption Algorithm cypher process | |
One round (out of 8.5) of the |
|
https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm | https://en.wikipedia.org/wiki/Internet_forum |
https://en.wikipedia.org/wiki/Pretty_Good_Privacy | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
Symmetric key ciphers are implemented as either |
|
https://en.wikipedia.org/wiki/Block_ciphers | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Stream_ciphers | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
The |
|
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Cryptography_standards | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-aes-34 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
34 | |
Despite its deprecation as an official standard, DES (especially its still-approved and much more secure |
|
https://en.wikipedia.org/wiki/Triple-DES | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-atm-35 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
35 | |
to |
|
https://en.wikipedia.org/wiki/E-mail_privacy | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-opgp-36 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
36 | |
and |
|
https://en.wikipedia.org/wiki/Secure_Shell | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-ssh-37 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
37 | |
Many other block ciphers have been designed and released, with considerable variation in quality.
Many, even some designed by capable practitioners, have been thoroughly broken, such as |
|
https://en.wikipedia.org/wiki/FEAL | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Cryptography#cite_note-schneierbook-38 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
38 | |
Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the |
|
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/RC4 | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Category:Stream_ciphers | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Block_cipher_modes_of_operation | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptographic_hash_functions | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Hash_function | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/MD4 | https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/MD5 | https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/National_Security_Agency | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/SHA-1 | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/SHA-2 | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-39 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
39 | |
Thus, a |
|
https://en.wikipedia.org/wiki/NIST_hash_function_competition | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Plug-in_(computing) https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/SHA-3 | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Keccak | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MySQL |
https://en.wikipedia.org/wiki/Cryptography#cite_note-40 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
40 | |
Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security. | |
https://en.wikipedia.org/wiki/Message_authentication_code | https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/WordPress#cite_note-6 https://en.wikipedia.org/wiki/WordPress#cite_note-5 https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Md5 | https://en.wikipedia.org/wiki/MySQL https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog |
Modern cryptography | |
The modern field of cryptography can be divided into several areas of study.
The chief ones are discussed here; see |
|
https://en.wikipedia.org/wiki/Topics_in_Cryptography | https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/MySQL |
Public-key cryptography | |
diagram of Public-key cryptography showing public key and private key | |
Public-key cryptography, where different keys are used for encryption and decryption. | |
Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others.
A significant disadvantage of symmetric ciphers is the |
|
https://en.wikipedia.org/wiki/Key_management | https://en.wikipedia.org/wiki/Learning_management_system https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Web_content_management_system |
https://en.wikipedia.org/wiki/Square_(algebra) | https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/MariaDB |
headshots of Whitfield Diffie and Martin Hellman | |