**Cryptography** or **cryptology** (from Ancient Greek: κρυπτός, translit. *kryptós* "hidden, secret"; and γράφειν *graphein*, "to write", or -λογία *-logia*, "study", respectively^{[1]}) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.^{[2]} More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages;^{[3]} various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation^{[4]} are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

Cryptography prior to the modern age was effectively synonymous with *encryption*, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same. The cryptography literature often uses the name Alice ("A") for the sender, Bob ("B") for the intended recipient, and Eve ("eavesdropper") for the adversary.^{[5]} Since the development of rotor cipher machines in World War I and the advent of computers in World War II, the methods used to carry out cryptology have become increasingly complex and its application more widespread.

Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that probably cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.

The growth of cryptographic technology has raised a number of legal issues in the information age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export.^{[6]} In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation.^{[7]}^{[8]} Cryptography also plays a major role in digital rights management and copyright infringement of digital media.^{[9]}

The first use of the term *cryptograph* (as opposed to *cryptogram*) dates back to the 19th century - it originated in *The Gold-Bug*, a novel by Edgar Allan Poe.^{[10]}

Until modern times, cryptography referred almost exclusively to *encryption*, which is the process of converting ordinary information (called plaintext) into unintelligible text (called ciphertext).^{[11]} Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A *cipher* (or *cypher*) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a "key". The key is a secret (ideally known only to the communicants), usually a short string of characters, which is needed to decrypt the ciphertext. Formally, a "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite possible cyphertexts, finite possible keys, and the encryption and decryption algorithms which correspond to each key. Keys are important both formally and in actual practice, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. There are two kinds of cryptosystems: symmetric and asymmetric. In symmetric systems the same key (the secret key) is used to encrypt and decrypt a message. Data manipulation in symmetric systems is faster than asymmetric systems as they generally use shorter key lengths. Asymmetric systems use a public key to encrypt a message and a private key to decrypt it. Use of asymmetric systems enhances the security of communication.^{[12]} Examples of asymmetric systems include RSA (Rivest-Shamir-Adleman), and ECC (Elliptic Curve Cryptography). Symmetric models include the commonly used AES (Advanced Encryption Standard) which replaced the older DES (Data Encryption Standard).^{[13]}

In colloquial use, the term "code" is often used to mean any method of encryption or concealment of meaning. However, in cryptography, *code* has a more specific meaning. It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, "wallaby" replaces "attack at dawn").

This page was last edited on 12 July 2018, at 10:25 (UTC).

Reference: https://en.wikipedia.org/wiki/Cryptography under CC BY-SA license.

Reference: https://en.wikipedia.org/wiki/Cryptography under CC BY-SA license.

- Ancient Greek
- ÎºÏÏ ÏÏÏÏ
- Translit.
- Î³ÏÎ¬ÏÎµÎ¹Î½
- -Î»Î¿Î³Î¯Î±
- -logia
- [1]
- Secure Communication
- Adversaries
- [2]
- Protocols
- [3]
- Information Security
- Confidentiality
- Data Integrity
- Authentication
- Non-repudiation
- [4]
- Mathematics
- Computer Science
- Electrical Engineering
- Communication Science
- Physics
- Electronic Commerce
- Chip-based Payment Cards
- Digital Currencies
- Computer Passwords
- Military Communications
- Encryption
- Nonsense
- Eavesdropper
- [5]
- Rotor Cipher Machines
- World War I
- Computers
- World War II
- Computational Hardness Assumptions
- Integer Factorization
- Information-theoretically Secure
- One-time Pad
- Espionage
- Sedition
- [6]
- Compel The Disclosure
- [7]
- [8]
- Digital Rights Management
- Copyright Infringement
- [9]
- The Gold-Bug
- Edgar Allan Poe
- [10]
- Plaintext
- Ciphertext
- [11]
- Cipher
- Algorithms
- Key
- Cryptosystem
- Authentication
- Symmetric
- Asymmetric
- [12]
- Rivest-Shamir-Adleman
- Elliptic Curve Cryptography
- Advanced Encryption Standard
- Data Encryption Standard
- [13]
- Colloquial
- Code
- Code Word

- Charles R. Buckalew
- Jana Sterbak
- Cryptography
- Sa (cuneiform)
- State Governments Of The United States
- Reel-to-reel Audio Tape Recording
- Karthik Subbaraj
- Sea-level Rise
- Surf Zone
- Storm Surges
- Morton S. Wilkinson
- The Crown
- Samuel Chifney Sr
- Saan Ka Man Naroroon
- Polizeipr%C3%A4sidium M%C3%BCnchen
- Thomas Wilde, 1st Baron Truro
- Wikipedia:Articles For DeletionInternational Reactions To The November 2015 Paris Attacks
- 8-track Tape
- Wage
- Sea Walls
- Coral Bleaching
- Abangan Ang Susunod Na Kabanata
- William Sprague IV
- Lake Baroon
- Asset
- Kagara, Sokoto
- LAX (TV Series)
- Dictation Machine
- Earth%E2%80%99s Energy Balance
- Thermal Inertia