Katana VentraIP

Cryptography

Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanizedkryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively[1]), is the practice and study of techniques for secure communication in the presence of adversarial behavior.[2] More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.[3] Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others.[4] Core concepts related to information security (data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography.[5] Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

"Secret code" redirects here. For the Aya Kamiki album, see Secret Code.

Cryptography prior to the modern age was effectively synonymous with encryption, converting readable information (plaintext) to unintelligible nonsense text (ciphertext), which can only be read by reversing the process (decryption). The sender of an encrypted (coded) message shares the decryption (decoding) technique only with the intended recipients to preclude access from adversaries. The cryptography literature often uses the names "Alice" (or "A") for the sender, "Bob" (or "B") for the intended recipient, and "Eve" (or "E") for the eavesdropping adversary.[6] Since the development of rotor cipher machines in World War I and the advent of computers in World War II, cryptography methods have become increasingly complex and their applications more varied.


Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by any adversary. While it is theoretically possible to break into a well-designed system, it is infeasible in actual practice to do so. Such schemes, if well designed, are therefore termed "computationally secure". Theoretical advances (e.g., improvements in integer factorization algorithms) and faster computing technology require these designs to be continually reevaluated and, if necessary, adapted. Information-theoretically secure schemes that provably cannot be broken even with unlimited computing power, such as the one-time pad, are much more difficult to use in practice than the best theoretically breakable but computationally secure schemes.


The growth of cryptographic technology has raised a number of legal issues in the Information Age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export.[7] In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation.[8][9] Cryptography also plays a major role in digital rights management and copyright infringement disputes with regard to digital media.[10]

Collision attack

Comparison of cryptography libraries

 – Securing and encrypting virology

Cryptovirology

 – Attempts to limit access to strong cryptography

Crypto Wars

 – Book by Technische Universiteit Eindhoven

Encyclopedia of Cryptography and Security

 – Mass surveillance across national borders

Global surveillance

 – Type of cryptographic software obfuscation

Indistinguishability obfuscation

 – Scientific study of digital information

Information theory

Outline of cryptography

List of cryptographers

Secure cryptoprocessor

 – Term applied to cryptographic systems that are highly resistant to cryptanalysis

Strong cryptography

 – Eighteenth-century work believed to be the first cryptography chart – first cryptography chart

Syllabical and Steganographical Table

's Web Cryptography API – World Wide Web Consortium cryptography standard

World Wide Web Consortium

The dictionary definition of cryptography at Wiktionary

Media related to Cryptography at Wikimedia Commons

on In Our Time at the BBC

Cryptography

Archived 4 July 2022 at the Wayback Machine

Crypto Glossary and Dictionary of Technical Cryptography

by Raphael Pass & Abhi Shelat – offered at Cornell in the form of lecture notes.

A Course in Cryptography

For more on the use of cryptographic elements in fiction, see: Dooley, John F. (23 August 2012). . Archived from the original on 29 July 2020. Retrieved 20 February 2015.

"Cryptology in Fiction"

at the Library of Congress has early editions of works of seventeenth-century English literature, publications relating to cryptography.

The George Fabyan Collection