比特派安卓怎么下载|cryptographic
比特派安卓怎么下载|cryptographic
What is Cryptography? Definition, Importance, Types | Fortinet
What is Cryptography? Definition, Importance, Types | Fortinet
Skip to content
Skip to navigation
Skip to footer
FREE PRODUCT DEMO
SERVICES
SUPPORT
DOWNLOADS
FORTICLOUD LOGIN
username
Search
USA (English)
UK & Ireland (English)
Germany (Deutsch)
France (Français)
Italy (Italiano)
China (简体中文)
Taiwan (繁體中文)
Korea (한국어)
Japan (日本語)
Brazil (Portugués)
Latin America (Español)
Products
Network Security
Hybrid Mesh Firewall
Next-Generation Firewall
Virtual Next-Generation Firewall
Cloud-Native Firewall
FortiGuard AI-Powered Security Services
Threat Protection
Intrusion Prevention Service (IPS)
URL Filtering
DNS Filtering
Inline Malware Prevention
Attack Surface Security Rating
IoT Detection
NOC Management
Central Management
Firewall Migration Service
Latest From Fortinet
Revolutionizing Security for Hybrid Network Protection
Explore the Gartner® Market Guide to understand emerging trends to secure your hybrid network with our Fortinet Hybrid Mesh Firewall solution.
Get the Report
Learn more about
Secure Networking
»
Secure Access Service Edge (SASE)
Single Vendor SASE
Secure SD-WAN
Security Service Edge (SSE)
Zero Trust Network Access (ZTNA)
Secure Web Gateway (Proxy)
CASB
Secure Endpoint Connectivity
Unified Agent (FortiClient)
Identity
Identity Access Management (IAM)
Identity as-a-Service
Privileged Access Management
NOC Management
Centralized Management
Digital Experience Monitoring
FortiGuard AI-Powered Security Services
Threat Protection
Data Loss Prevention (DLP)
URL Filtering
Intrusion Prevention Service (IPS)
DNS Filtering
SOC-as-a-Service
Inline Malware Prevention
IoT Detection
Latest From Fortinet
A Challenger in the 2023 Gartner® Magic Quadrant™ for Single-Vendor SASE
FortiSASE: Delivering consistent security for the hybrid workforce
Get the Report
Learn more about
Unified SASE
»
Enterprise Networking
LAN
Switching
Wireless LAN (WLAN)
Network Access Control (NAC)
Cloud-based LAN Management
WAN
Secure SD-WAN
5G/LTE Wireless WAN
Communications & Surveillance
Voice & Collaboration
Video Surveillance
NOC Management
Central Management
Artificial Intelligence for IT Operations
FortiGuard AI-Powered Security Services
Threat Protection
Intrusion Prevention Service (IPS)
IoT Detection
URL Filtering
DNS Filtering
OT Security Service
Latest From Fortinet
Fortinet Recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for Enterprise Wired and Wireless LAN Infrastructure
Fortinet delivers an organically developed converged networking and security solution grounded in AI.
Get the Report
Learn more about
Secure Networking
»
Security Operations
Security Operations Automation
Security Fabric Analytics
Security Information & Event Management (SIEM/UEBA)
Security Orchestration, Automation, & Response (SOAR/TIM)
GenAI-powered Security Assistant
Early Detection & Prevention
Endpoint Detection & Response
Network Detection & Response (NDR)
Deception Technology
Digital Risk Protection Systems (DRPS)
Sandbox Analysis
Secure Email Gateway
Endpoint Security
Endpoint Security Solutions
Extended Detection & Response
Cloud Governance, Risk, and Compliance
Advanced Cloud Security Posture Management (CSPM)
Expert Services
Incident Response
Security Advisory
Ransomware Advisory
Managed Detection & Response (MDR)
SOC-as-a-Service (SOCaaS)
FortiGuard AI-Powered Security Services
Threat Protection
Latest From Fortinet
Slash Cyber Risk From Weeks to Minutes
Enterprise Strategy Group quantifies the reduction in time, effort, and risk with Fortinet Security Operations Solutions.
Download the Report
Learn more about
Security Operations
»
Application Security
Cloud Network Security
Virtual Network Firewall
Cloud-Native Firewall
Distributed Denial of Service Protection
Web Application / API Protection
Web Application Firewall
Application Delivery & Server Load Balancing
Dynamic Application Security Testing (DAST)
FortiGuard Advanced Bot Protection
Cloud-Native Protection
Workload Protection & Cloud Security Posture Management
DevSecOps
Cloud Service Providers
AWS
Microsoft Azure
Google Cloud
Oracle
FortiGuard AI-Powered Security Services
Threat Protection
Latest From Fortinet
2023 Cloud Security Report
Discover why 95% of organizations are moderately to extremely concerned about cloud security in 2023.
Download the Report
Learn more about
Application Security
»
Operational Technology
Overview
Secure Operational Technology
Products
Ruggedized Network Firewall
Security Information & Event Management (SIEM/UEBA)
Security Orchestration, Automation, & Response (SOAR/TIM)
Privileged Access Management
Secure Ethernet Switches
Endpoint Detection & Response (EDR)
Network Detection & Response (NDR)
FortiGuard AI-Powered Security Services
Threat Protection
OT Security
IoT Detection
Inline Malware Prevention
Intrusion Prevention Service (IPS)
Expert Services
SOC-as-a-Service (SOCaaS)
OT Tabletop Exercise
Latest From Fortinet
Fortinet is One of the Fastest-Growing OT Security Vendors
Fortinet Recognized as the Sole Leader in the Westlands Advisory 2023 IT/OT Network Protection Platforms Navigator™
Download the Report
Learn more about the
Fortinet Security Fabric
»
View All Products
Solutions
Enterprise
Featured
Secure Networking
Unified SASE
Work From Anywhere
Secure Application Journey
Secure Operational Technology
Security Operations
GenAI-powered Security Assistant
Cybersecurity Platform
Hybrid Mesh Firewall
Fortinet Security Fabric
FortiOS
Flexible Consumption Licensing
Usage-Based Licensing
Latest From Fortinet
318% ROI Revealed in Forrester TEI Study
Fortinet NGFW for Data Center and FortiGuard AI-Powered Security Services Solution.
Download the Study
Small & Midsize Business
Overview
Small & Midsize Business
Products
Next-Generation Firewall
Virtual Next-Generation Firewall
Switching
Wireless LAN (WLAN)
Management & Reporting
Secure Access Service Edge (SASE)
Services
FortiGuard Security Portfolio
FortiConverter
FortiCare Support Services
Security Awareness Training
Cyber Threat Assessment
Cloud Consulting Services
Expert Services
SOC-as-a-Service (SOCaaS)
Latest From Fortinet
Fortinet Achieves a 99.88% Security Effectiveness Score in 2023 CyberRatings
FortiGate NGFW earned the highest ranking of ‘AAA’ showcasing low cost of ownership and high ROI in the Enterprise Firewall Report.
Download the Report
Operational Technology
Overview
Secure Operational Technology
Products
Ruggedized Network Firewall
Security Information & Event Management (SIEM/UEBA)
Security Orchestration, Automation, & Response (SOAR/TIM)
Privileged Access Management
Secure Ethernet Switches
Endpoint Detection & Response (EDR)
Network Detection & Response (NDR)
FortiGuard AI-Powered Security Services
Threat Protection
OT Security
IoT Detection
Inline Malware Prevention
Intrusion Prevention Service (IPS)
Expert Services
SOC-as-a-Service (SOCaaS)
OT Tabletop Exercise
Latest From Fortinet
Fortinet is One of the Fastest-Growing OT Security Vendors
Fortinet Recognized as the Sole Leader in the Westlands Advisory 2023 IT/OT Network Protection Platforms Navigator™
Download the Report
Learn more about the
Fortinet Security Fabric
»
Industries
IT/OT
Operational Technology
Manufacturing
SCADA/ICS
Oil & Gas
Power Utilities
Health and Medical
Healthcare
Pharmaceutical
Education
Higher Education
K–12 School Districts
Consumer
Financial Services
Retail
Hospitality
All Industries
View All
Latest From Fortinet
Fortinet is One of the Fastest-Growing OT Security Vendors
Fortinet Recognized as the Sole Leader in the Westlands Advisory 2023 IT/OT Network Protection Platforms Navigator™
Download the Report
Service Providers
Managed Services
Solutions
MSSP Cybersecurity
Managed SD-WAN for Service Providers
Managed SOC Service
Managed Cloud Security Service
Managed WAF Service
Case Studies
Orange Business Services
GTT Communications
Spark NZ
View All
Communication Service Providers
Solutions
Overview
Headquarters Network Security
PCI Compliance
Secure Networking
ATP
Adaptive Cloud Security
Latest From Fortinet
2023 Cybersecurity Skills Gap Global Research Report
Cyberthreats are increasing in volume and sophistication while organizations around the world struggle to fill security positions.
Read the Press Release
Mobile Provider
Overview
Cybersecurity for Mobile Networks and Ecosystems
Latest From Fortinet
Energy- and Space-Efficient Security in Telco Networks
Secure your infrastructure while reducing energy costs and overall environmental impact
Download the White Paper
Support & Services
Cybersecurity Services
Cybersecurity Subscriptions
FortiGuard Security Portfolio
CASB
Data Loss Prevention
URL Filtering
DNS Filtering
Inline Malware Prevention
Intrusion Prevention Service (IPS)
IoT Detection
OT Security
Security Rating
Employee Training
Free Training & On-demand Labs
Security Awareness Training
Phishing Simulation
Expert Services
Incident Response
Managed Detection & Response (MDR)
Ransomware Advisory Services
Security Advisory Services
SOC-as-a-Service (SOCaaS)
Latest From Fortinet
Understand the Threat Profiles of 2023 Outbreak Alerts
Gain an in-depth understanding of various threat categories, including vulnerabilities, targeted attacks, ransomware campaigns, and OT- and IoT-related threats.
Get the Report
FortiCare Support
Technical Support
Contact FortiCare Customer Support
Support Services
Customer Support & RMA
Advanced Support
Resources
Experienced a Breach?
Getting Started and Registration
Documents Library
Fortinet Community
Latest From Fortinet
Understand the Threat Profiles of 2023 Outbreak Alerts
Gain an in-depth understanding of various threat categories, including vulnerabilities, targeted attacks, ransomware campaigns, and OT- and IoT-related threats.
Get the Report
318% ROI Revealed in Forrester TEI Study
Delivered with Fortinet NGFWs for Data Center and FortiGuard AI-Powered Security Services Solution.
Download the Study
FortiCare Professional Services
Services
Professional Services
Cloud Consulting Services
Latest From Fortinet
Understand the Threat Profiles of 2023 Outbreak Alerts
Gain an in-depth understanding of various threat categories, including vulnerabilities, targeted attacks, ransomware campaigns, and OT- and IoT-related threats.
Get the Report
318% ROI Revealed in Forrester TEI Study
Delivered with Fortinet NGFWs for Data Center and FortiGuard AI-Powered Security Services Solution.
Download the Study
More
Company
Fortinet
About Us
Executive Management
Investor Relations
Executive Briefing Center
Newsroom
Blogs
Social Responsibility
Life at Fortinet
Careers
Early Talent Programs
Connect With Us
Fortinet Community
Email Preference Center
Trust
Fortinet Trust Center
Security Certifications
Product Certifications
Fortinet Federal, Inc.
Analyst Reports
Advisory Councils
Fortinet Strategic Advisory Council
Veterans Program Advisory Council
Resources
Customer Stories
Resource Center
Ransomware Hub
Fortinet TV
Cyber Glossary
Fortinet Icon Library
Fortinet Video Library
Ordering Guides
Fortinet Contracts & Grants
Events & Webinars
Accelerate 2024
Events
Webinars
On-Demand Webinars
Training
Overview
Training Institute
Certification Program
Free Training & On-demand Labs
Authorized Training Centers
Platform
Training Institute Portal
Programs and Services
Academic Partner Program
Education Outreach Program
Veterans Program
Security Awareness Training
Security Awareness Service
For All Schools
For United States Schools
For United Kingdom Schools
For Australian Schools
For Canadian Schools
Latest From Fortinet
Fortinet Research Finds Over 80% of Organizations Experience Cyber Attacks that Target Employees
With most cyberthreats targeting individuals directly, this report reveals the need for having an effective security awareness and training program for all employees.
Read the Press Release
Partners
For Partners
Partner Login
Become a Partner
Join the Ecosystem
For Customers
Ecosystem Overview
Fabric Connectors
Find a Partner
Global System Integrators
For Service Providers
Managed Services
Communication Service Providers
Mobile Provider
Latest From Fortinet
Fortinet Named to 2022 Dow Jones Sustainability World and North America Indices
For the first time, ranking among the global top sustainable companies in the software and services industry.
Read the Press Release
Contact Us
Contact Us
SALES
Contact Sales
Request a Quote
Experienced a Breach?
Cyber Threat Assessment
Free Product Demo
SUPPORT
Contact FortiCare Technical Support
Call our Support Team
Fortinet Community: Support Forum
FIND A RESELLER
North America
EMEA
Latin America & Caribbean
APAC, Australia & New Zealand
Latest From Fortinet
Fortinet 2022 Sustainability Report
In our report, we share the progress made in 2022 across our ESG priorities and detail how Fortinet is advancing cybersecurity as a sustainability issue.
Read the Press Release
FortiGuard Labs Threat Intelligence
What Is Cryptography?
Get Free Cybersecurity Training
Cryptography Definition
Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.
Modern cryptography techniques include algorithms and ciphers that enable the encryption and decryption of information, such as 128-bit and 256-bit encryption keys. Modern ciphers, such as the Advanced Encryption Standard (AES), are considered virtually unbreakable.
A common cryptography definition is the practice of coding information to ensure only the person that a message was written for can read and process the information. This cybersecurity practice, also known as cryptology, combines various disciplines like computer science, engineering, and mathematics to create complex codes that hide the true meaning of a message.
Cryptography can be traced all the way back to ancient Egyptian hieroglyphics but remains vital to securing communication and information in transit and preventing it from being read by untrusted parties. It uses algorithms and mathematical concepts to transform messages into difficult-to-decipher codes through techniques like cryptographic keys and digital signing to protect data privacy, credit card transactions, email, and web browsing.
The Importance of Cryptography
Cryptography remains important to protecting data and users, ensuring confidentiality, and preventing cyber criminals from intercepting sensitive corporate information. Common uses and examples of cryptography include the following:
Privacy and Confidentiality
Individuals and organizations use cryptography on a daily basis to protect their privacy and keep their conversations and data confidential. Cryptography ensures confidentiality by encrypting sent messages using an algorithm with a key only known to the sender and recipient. A common example of this is the messaging tool WhatsApp, which encrypts conversations between people to ensure they cannot be hacked or intercepted.
Cryptography also secures browsing, such as with virtual private networks (VPNs), which use encrypted tunnels, asymmetric encryption, and public and private shared keys.
Authentication
Integrity
Similar to how cryptography can confirm the authenticity of a message, it can also prove the integrity of the information being sent and received. Cryptography ensures information is not altered while in storage or during transit between the sender and the intended recipient. For example, digital signatures can detect forgery or tampering in software distribution and financial transactions.
Nonrepudiation
Cryptography confirms accountability and responsibility from the sender of a message, which means they cannot later deny their intentions when they created or transmitted information. Digital signatures are a good example of this, as they ensure a sender cannot claim a message, contract, or document they created to be fraudulent. Furthermore, in email nonrepudiation, email tracking makes sure the sender cannot deny sending a message and a recipient cannot deny receiving it.
Key Exchange
Key exchange is the method used to share cryptographic keys between a sender and their recipient.
Types of Cryptographic Algorithms
There are many types of cryptographic algorithms available. They vary in complexity and security, depending on the type of communication and the sensitivity of the information being shared.
Secret Key Cryptography
Secret key cryptography, also known as symmetric encryption, uses a single key to encrypt and decrypt a message. The sender encrypts the plaintext message using the key and sends it to the recipient who then uses the same key to decrypt it and unlock the original plaintext message.
Stream Ciphers
Stream ciphers work on a single bit or byte at any time and constantly change the key using feedback mechanisms. A self-synchronizing stream cipher ensures the decryption process stays in sync with the encryption process by recognizing where it sits in the bit keystream. A synchronous stream cipher generates the keystream independently of the message stream and generates the same keystream function at both the sender and the receiver.
Block Ciphers
Block ciphers encrypt one block of fixed-size data at a time. It will always encrypt a plaintext data block to the same ciphertext when the same key is used. A good example of this is the Feistel cipher, which uses elements of key expansion, permutation, and substitution to create vast confusion and diffusion in the cipher.
The stages of encryption and decryption are similar if not identical, which means reversing the key reduces the code size and circuitry required for implementing the cipher in a piece of software or hardware.
Public Key Cryptography
Public key cryptography (PKC), or asymmetric cryptography, uses mathematical functions to create codes that are exceptionally difficult to crack. It enables people to communicate securely over a nonsecure communications channel without the need for a secret key. For example, proxy reencryption enables a proxy entity to reencrypt data from one public key to another without requiring access to the plaintext or private keys.
A common PKC type is multiplication vs. factorization, which takes two large prime numbers and multiplies them to create a huge resulting number that makes deciphering difficult. Another form of PKC is exponentiation vs. logarithms such as 256-bit encryption, which increases protection to the point that even a computer capable of searching trillions of combinations per second cannot crack it.
Generic forms of PKC use two keys that are related mathematically but do not enable either to be determined. Put simply, a sender can encrypt their plaintext message using their private key, then the recipient decrypts the ciphertext using the sender’s public key.
Common PKC algorithms used for digital signatures and key exchanges include:
RSA
RSA was the first and remains the most common PKC implementation. The algorithm is named after its MIT mathematician developers, Ronald Rivest, Adi Shamir, and Leonard Adleman, and is used in data encryption, digital signatures, and key exchanges. It uses a large number that is the result of factoring two selected prime numbers. It is impossible for an attacker to work out the prime factors, which makes RSA especially secure.
Elliptic Curve Cryptography (ECC)
ECC is a PKC algorithm based on the use of elliptic curves in cryptography. It is designed for devices with limited computing power or memory to encrypt internet traffic. A common use of ECC is in embedded computers, smartphones, and cryptocurrency networks like bitcoin, which consumes around 10% of the storage space and bandwidth that RSA requires.
Digital Signature Algorithm (DSA)
DSA is a standard that enables digital signatures to be used in message authentication. It was introduced by the National Institute of Standards and Technology (NIST) in 1991 to ensure a better method for creating digital signatures.
Identity-based Encryption (IBE)
IBE is a PKC system that enables the public key to be calculated from unique information based on the user’s identity, such as their email address. A trusted third party or private key generator then uses a cryptographic algorithm to calculate a corresponding private key. This enables users to create their own private keys without worrying about distributing public keys.
Public Key Cryptography Standards (PKCS)
All PKC algorithms and usage are governed by a set of standards and guidelines designed by RSA Data Security. These are as follows:
PKCS #1 or RFC 8017: RSA Cryptography Standard
PKCS #3: Diffie-Hellman Key Agreement Standard
PKCS #5 and PKCS #5 v2.1 or RFC 8018: Password-Based Cryptography Standard
PKCS #6: Extended-Certificate Syntax Standard (being replaced by X.509v3)
PKCS #7 or RFC 2315: Cryptographic Message Syntax Standard
PKCS #8 or RFC 5958: Private Key Information Syntax Standard
PKCS #9 or RFC 2985: Selected Attribute Types
PKCS #10 or RFC 2986: Certification Request Syntax Standard
PKCS #11: Cryptographic Token Interface Standard
PKCS #12 or RFC 7292: Personal Information Exchange Syntax Standard
PKCS #13: Elliptic Curve Cryptography Standard
PKCS #14: Pseudorandom Number Generation Standard
PKCS #15: Cryptographic Token Information Format Standard
Diffie-Hellman and Key Exchange Algorithm (KEA)
The Diffie-Hellman algorithm was devised in 1976 by Stanford University professor Martin Hellman and his graduate student Whitfield Diffie, who are considered to be responsible for introducing PKC as a concept. It is used for secret key exchanges and requires two people to agree on a large prime number.
KEA is a variation of the Diffie-Hellman algorithm and was proposed as a method for key exchange in the NIST/National Security Agency’s (NSA) Capstone project, which developed cryptography standards for public and government use.
Hash Function
Hash functions ensure that data integrity is maintained in the encryption and decryption phases of cryptography. It is also used in databases so that items can be retrieved more quickly.
Hashing is the process of taking a key and mapping it to a specific value, which is the hash or hash value. A hash function transforms a key or digital signature, then the hash value and signature are sent to the receiver, who uses the hash function to generate the hash value and compare it with the one they received in the message.
A common hash function is folding, which takes a value and divides it into several parts, adds parts, and uses the last four remaining digits as the key or hashed value. Another is digit rearrangement, which takes specific digits in the original value, reverses them, and uses the remaining number as the hash value. Examples of hash function types include Secure Hash Algorithm 1 (SHA-1), SHA-2, and SHA-3.
What Are Cryptographic Key Attacks? What Are the Types?
Modern cryptographic key techniques are increasingly advanced and often even considered unbreakable. However, as more entities rely on cryptography to protect communications and data, it is vital to keep keys secure. One compromised key could result in regulatory action, fines and punishments, reputational damage, and the loss of customers and investors.
Potential key-based issues and attack types that could occur include:
Weak Keys
Keys are essentially random numbers that become more difficult to crack the longer the number is. Key strength and length need to be relative to the value of the data it protects and the length of time that data needs to be protected. Keys should be created with a high-quality, certified random number generator that collects entropy—the information density of a file in bits or characters—from suitable hardware noise sources.
Incorrect Use of Keys
When keys are used improperly or encoded poorly, it becomes easier for a hacker to crack what should have been a highly secure key.
Reuse of Keys
Every key should only be generated for a specific single-use encrypt/decrypt purpose, and use beyond that may not offer the level of protection required.
Non-rotation of Keys
Keys that are overused, such as encrypting too much data on a key, become vulnerable to attacks. This is particularly the case with older ciphers and could result in data being exposed. Keys need to be rotated, renewed, and updated when appropriate.
Inappropriate Storage of Keys
Storing keys alongside the information they have been created to protect increases their chances of being compromised. For example, keys stored on a database or server that gets breached could also be compromised when the data is exfiltrated.
Inadequate Protection of Keys
Huge cyberattacks like Meltdown/Spectre and Heartbleed have been capable of exposing cryptographic keys stored in server memory. Therefore, stored keys must be encrypted and only made available unencrypted when placed within secure, tamper-protected environments, or even kept offline.
Insecure Movement of Keys
Moving keys between systems should only occur when the key is encrypted or wrapped under an asymmetric or symmetric pre-shared transport key. If this is not possible, then the key must be split up into multiple parts that are kept separate, re-entered into the target system, then destroyed.
Insider Threats (User Authentication, Dual Control, and Segregation of Roles)
Insider threats are one of the most serious threats posed to any key. This is most likely to occur through a rogue employee having access to a key, then using it for malicious purposes or giving or selling it to a hacker or third party.
Lack of Resilience
Resilience is vital to protecting the availability, confidentiality, and integrity of keys. Any key that suffers a fault with no backup results in the data the key protects being lost or inaccessible.
Lack of Audit Logging
Key life cycles must be logged and recorded in full to ensure any compromise can be tracked and enable subsequent investigations to occur smoothly.
Manual Key Management Processes
Recording key management processes manually on paper or spreadsheets runs the risk of human error and makes the keys highly vulnerable to attack or theft.
How to Minimize the Risks Associated with Cryptography
Organizations and individuals can minimize and mitigate cryptography-related threats with a dedicated electronic key management system from a reputable provider. The solution must use a hardware security module to generate and protect keys, and underpin the entire system’s security.
It needs to include features like full key management life cycle, strong key generation, strict policy-based controls, swift compromise detection, secure key destruction, strong user authentication, secure workflow management, and a secure audit and usage log. This will protect the organization's keys, enhance efficiency, and ensure compliance with data and privacy regulations.
Another potential solution is cryptography quantum, whereby it is impossible to copy data encoded in a quantum state.
Frequently Asked Questions about Cryptography
What do you mean by cryptography?
In computer science, cryptography is the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages.
What are the three types of cryptography?
The three types of cryptography are:
Secret key cryptography
Public key cryptography
Hash function cryptography
What is an example of cryptography?
The Rivest-Shamir-Adleman (RSA) algorithm is widely used on the Internet. RSA uses a pair of keys to encrypt and decrypt information.
Related Reads
Trending Now
Man-in-the-Middle Attack
A man-in-the-middle (MITM) attack is a form of cyberattack in which criminals exploiting weak web-based protocols insert themselves between entities in a communication.
Trending Now
Brute Force Attack
A brute force attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
Trending Now
Ransomware
Ransomware is a specific type of malware that holds data hostage in exchange for a ransom.
More Resources Available
WHITE PAPER: FortiMail Identity Based Encryption
WHITE PAPER: Fortinet and Secure Email Security Solution
WHITE PAPER: The Fortinet Secure Health Architecture
Products
Enterprise
Secure Networking
User and Device Security
Security Operations
Application Security
FortiGuard Labs Threat Intelligence
Small Mid-Sized Businesses
Overview
Service Providers
Overview
Partners
Overview
Alliances Ecosystem
Find a Partner
Become a Partner
Partner Login
Trust Center
Trusted Products
Trusted Company
Trusted Process
Trusted Partners
Product Certifications
More
About Us
Training
Resources
Ransomware Hub
Support
Downloads
CyberGlossary
Careers
Early Talent Program
Investor Relations
Social Responsibility
Sitemap
Enter Email Address
Subscription Successful!
Request Failed. Please try again later!
I want to receive news and product emails. Read our privacy policy.
address1
Connect With Us
Blogs
Fortinet Community
Email Preference Center
Contact Us
Products
Enterprise
Secure Networking
User and Device Security
Security Operations
Application Security
FortiGuard Labs Threat Intelligence
Small Mid-Sized Businesses
Overview
Service Providers
Overview
Partners
Overview
Alliances Ecosystem
Find a Partner
Become a Partner
Partner Login
Trust Center
Trusted Products
Trusted Company
Trusted Process
Trusted Partners
Product Certifications
More
About Us
Training
Resources
Ransomware Hub
Support
Downloads
CyberGlossary
Careers
Early Talent Program
Investor Relations
Social Responsibility
Sitemap
Enter Email Address
Subscription Successful!
Request Failed. Please try again later!
I want to receive news and product emails. Read our privacy policy.
address1
Connect With Us
Blogs
Fortinet Community
Email Preference Center
Contact Us
Copyright © 2024 Fortinet, Inc. All Rights Reserved.
Terms of Service
Privacy Policy
Notice for California Residents
Do Not Sell Or Share My Personal Information
GDPR
Canadian Accessibility
Cookie Settings
Cryptography - Wikipedia
Cryptography - Wikipedia
Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main pageContentsCurrent eventsRandom articleAbout WikipediaContact usDonate
Contribute
HelpLearn to editCommunity portalRecent changesUpload file
Search
Search
Create account
Log in
Personal tools
Create account Log in
Pages for logged out editors learn more
ContributionsTalk
Contents
move to sidebar
hide
(Top)
1Terminology
2History
Toggle History subsection
2.1Classic cryptography
2.2Early computer-era cryptography
2.3Modern cryptography
3Modern cryptography
Toggle Modern cryptography subsection
3.1Symmetric-key cryptography
3.2Public-key cryptography
3.3Cryptographic hash functions
3.4Cryptanalysis
3.5Cryptographic primitives
3.6Cryptosystems
3.7Lightweight cryptography
4Applications
Toggle Applications subsection
4.1Cybersecurity
4.2Cryptocurrencies and cryptoeconomics
5Legal issues
Toggle Legal issues subsection
5.1Prohibitions
5.2Export controls
5.3NSA involvement
5.4Digital rights management
5.5Forced disclosure of encryption keys
6See also
7References
8Further reading
9External links
Toggle the table of contents
Cryptography
95 languages
AfrikaansالعربيةAsturianuAzərbaycancaবাংলাBân-lâm-gúБашҡортсаБеларускаяБеларуская (тарашкевіца)БългарскиBoarischBosanskiCatalàČeštinaDanskالدارجةDeutschEestiΕλληνικάEspañolEsperantoEuskaraفارسیFrançaisGaeilgeGalego贛語ગુજરાતી한국어Հայերենहिन्दीHrvatskiBahasa IndonesiaIsiZuluÍslenskaItalianoעבריתJawaಕನ್ನಡქართულიҚазақшаKiswahiliKriyòl gwiyannenКыргызчаLatinaLatviešuLietuviųLombardMagyarМакедонскиമലയാളംमराठीBahasa MelayuМонголမြန်မာဘာသာNederlands日本語NordfriiskNorsk bokmålNorsk nynorskOccitanОлык марийଓଡ଼ିଆOʻzbekcha / ўзбекчаپنجابیPatoisPiemontèisPolskiPortuguêsRomânăРусскийShqipSicilianuSimple EnglishSlovenčinaSlovenščinaکوردیСрпски / srpskiSrpskohrvatski / српскохрватскиSuomiSvenskaTagalogதமிழ்ไทยТоҷикӣTürkçeУкраїнськаاردوTiếng ViệtWinaray吴语ייִדיש粵語Zazaki中文
Edit links
ArticleTalk
English
ReadEditView history
Tools
Tools
move to sidebar
hide
Actions
ReadEditView history
General
What links hereRelated changesUpload fileSpecial pagesPermanent linkPage informationCite this pageGet shortened URLDownload QR codeWikidata item
Print/export
Download as PDFPrintable version
In other projects
Wikimedia CommonsWikibooksWikiquoteWikiversity
From Wikipedia, the free encyclopedia
This is the latest accepted revision, reviewed on 9 March 2024.
Practice and study of secure communication techniques
"Secret code" redirects here. For the Aya Kamiki album, see Secret Code.
"Cryptology" redirects here. For the David S. Ware album, see Cryptology (album).
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: "Cryptography" – news · newspapers · books · scholar · JSTOR (March 2021) (Learn how and when to remove this template message)
Lorenz cipher machine, used in World War II to encrypt communications of the German High Command
Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively[1]), is the practice and study of techniques for secure communication in the presence of adversarial behavior.[2] More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.[3] Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others.[4] Core concepts related to information security (data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography.[5] Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.
Cryptography prior to the modern age was effectively synonymous with encryption, converting readable information (plaintext) to unintelligible nonsense text (ciphertext), which can only be read by reversing the process (decryption). The sender of an encrypted (coded) message shares the decryption (decoding) technique only with the intended recipients to preclude access from adversaries. The cryptography literature often uses the names "Alice" (or "A") for the sender, "Bob" (or "B") for the intended recipient, and "Eve" (or "E") for the eavesdropping adversary.[6] Since the development of rotor cipher machines in World War I and the advent of computers in World War II, cryptography methods have become increasingly complex and their applications more varied.
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by any adversary. While it is theoretically possible to break into a well-designed system, it is infeasible in actual practice to do so. Such schemes, if well designed, are therefore termed "computationally secure". Theoretical advances (e.g., improvements in integer factorization algorithms) and faster computing technology require these designs to be continually reevaluated and, if necessary, adapted. Information-theoretically secure schemes that provably cannot be broken even with unlimited computing power, such as the one-time pad, are much more difficult to use in practice than the best theoretically breakable but computationally secure schemes.
The growth of cryptographic technology has raised a number of legal issues in the Information Age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export.[7] In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation.[8][9] Cryptography also plays a major role in digital rights management and copyright infringement disputes with regard to digital media.[10]
Terminology[edit]
Alphabet shift ciphers are believed to have been used by Julius Caesar over 2,000 years ago.[6] This is an example with k = 3. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
The first use of the term "cryptograph" (as opposed to "cryptogram") dates back to the 19th century—originating from "The Gold-Bug", a story by Edgar Allan Poe.[11][12]
Until modern times, cryptography referred almost exclusively to "encryption", which is the process of converting ordinary information (called plaintext) into an unintelligible form (called ciphertext).[13] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that carry out the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and, in each instance, by a "key". The key is a secret (ideally known only to the communicants), usually a string of characters (ideally short so it can be remembered by the user), which is needed to decrypt the ciphertext. In formal mathematical terms, a "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite possible cyphertexts, finite possible keys, and the encryption and decryption algorithms that correspond to each key. Keys are important both formally and in actual practice, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.
There are two main types of cryptosystems: symmetric and asymmetric. In symmetric systems, the only ones known until the 1970s, the same secret key encrypts and decrypts a message. Data manipulation in symmetric systems is significantly faster than in asymmetric systems. Asymmetric systems use a "public key" to encrypt a message and a related "private key" to decrypt it. The advantage of asymmetric systems is that the public key can be freely published, allowing parties to establish secure communication without having a shared secret key. In practice, asymmetric systems are used to first exchange a secret key, and then secure communication proceeds via a more efficient symmetric system using that key.[14] Examples of asymmetric systems include Diffie–Hellman key exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used AES (Advanced Encryption Standard) which replaced the older DES (Data Encryption Standard).[15] Insecure symmetric algorithms include children's language tangling schemes such as Pig Latin or other cant, and all historical cryptographic schemes, however seriously intended, prior to the invention of the one-time pad early in the 20th century.
In colloquial use, the term "code" is often used to mean any method of encryption or concealment of meaning. However, in cryptography, code has a more specific meaning: the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, "wallaby" replaces "attack at dawn"). A cypher, in contrast, is a scheme for changing or substituting an element below such a level (a letter, a syllable, or a pair of letters, etc.) in order to produce a cyphertext.
Cryptanalysis is the term used for the study of methods for obtaining the meaning of encrypted information without access to the key normally required to do so; i.e., it is the study of how to "crack" encryption algorithms or their implementations.
Some use the terms "cryptography" and "cryptology" interchangeably in English,[16] while others (including US military practice generally) use "cryptography" to refer specifically to the use and practice of cryptographic techniques and "cryptology" to refer to the combined study of cryptography and cryptanalysis.[17][18] English is more flexible than several other languages in which "cryptology" (done by cryptologists) is always used in the second sense above. RFC 2828 advises that steganography is sometimes included in cryptology.[19]
The study of characteristics of languages that have some application in cryptography or cryptology (e.g. frequency data, letter combinations, universal patterns, etc.) is called cryptolinguistics. Cryptolingusitics is especially used in military intelligence applications for deciphering foreign communications.[20][21]
History[edit]
Main article: History of cryptography
Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). Encryption attempted to ensure secrecy in communications, such as those of spies, military leaders, and diplomats. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others.
Classic cryptography[edit]
Reconstructed ancient Greek scytale, an early cipher device
The main classical cipher types are transposition ciphers, which rearrange the order of letters in a message (e.g., 'hello world' becomes 'ehlol owrdl' in a trivially simple rearrangement scheme), and substitution ciphers, which systematically replace letters or groups of letters with other letters or groups of letters (e.g., 'fly at once' becomes 'gmz bu podf' by replacing each letter with the one following it in the Latin alphabet).[22] Simple versions of either have never offered much confidentiality from enterprising opponents. An early substitution cipher was the Caesar cipher, in which each letter in the plaintext was replaced by a letter some fixed number of positions further down the alphabet. Suetonius reports that Julius Caesar used it with a shift of three to communicate with his generals. Atbash is an example of an early Hebrew cipher. The earliest known use of cryptography is some carved ciphertext on stone in Egypt (c. 1900 BCE), but this may have been done for the amusement of literate observers rather than as a way of concealing information.
The Greeks of Classical times are said to have known of ciphers (e.g., the scytale transposition cipher claimed to have been used by the Spartan military).[23] Steganography (i.e., hiding even the existence of a message so as to keep it confidential) was also first developed in ancient times. An early example, from Herodotus, was a message tattooed on a slave's shaved head and concealed under the regrown hair.[13] Other steganography methods involve 'hiding in plain sight,' such as using a music cipher to disguise an encrypted message within a regular piece of sheet music. More modern examples of steganography include the use of invisible ink, microdots, and digital watermarks to conceal information.
In India, the 2000-year-old Kamasutra of Vātsyāyana speaks of two different kinds of ciphers called Kautiliyam and Mulavediya. In the Kautiliyam, the cipher letter substitutions are based on phonetic relations, such as vowels becoming consonants. In the Mulavediya, the cipher alphabet consists of pairing letters and using the reciprocal ones.[13]
In Sassanid Persia, there were two secret scripts, according to the Muslim author Ibn al-Nadim: the šāh-dabīrīya (literally "King's script") which was used for official correspondence, and the rāz-saharīya which was used to communicate secret messages with other countries.[24]
David Kahn notes in The Codebreakers that modern cryptology originated among the Arabs, the first people to systematically document cryptanalytic methods.[25] Al-Khalil (717–786) wrote the Book of Cryptographic Messages, which contains the first use of permutations and combinations to list all possible Arabic words with and without vowels.[26]
First page of a book by Al-Kindi which discusses encryption of messages
Ciphertexts produced by a classical cipher (and some modern ciphers) will reveal statistical information about the plaintext, and that information can often be used to break the cipher. After the discovery of frequency analysis, perhaps by the Arab mathematician and polymath Al-Kindi (also known as Alkindus) in the 9th century,[27] nearly all such ciphers could be broken by an informed attacker. Such classical ciphers still enjoy popularity today, though mostly as puzzles (see cryptogram). Al-Kindi wrote a book on cryptography entitled Risalah fi Istikhraj al-Mu'amma (Manuscript for the Deciphering Cryptographic Messages), which described the first known use of frequency analysis cryptanalysis techniques.[27][28]
16th-century book-shaped French cipher machine, with arms of Henri II of France
Enciphered letter from Gabriel de Luetz d'Aramon, French Ambassador to the Ottoman Empire, after 1546, with partial decipherment
Language letter frequencies may offer little help for some extended historical encryption techniques such as homophonic cipher that tend to flatten the frequency distribution. For those ciphers, language letter group (or n-gram) frequencies may provide an attack.
Essentially all ciphers remained vulnerable to cryptanalysis using the frequency analysis technique until the development of the polyalphabetic cipher, most clearly by Leon Battista Alberti around the year 1467, though there is some indication that it was already known to Al-Kindi.[28] Alberti's innovation was to use different ciphers (i.e., substitution alphabets) for various parts of a message (perhaps for each successive plaintext letter at the limit). He also invented what was probably the first automatic cipher device, a wheel that implemented a partial realization of his invention. In the Vigenère cipher, a polyalphabetic cipher, encryption uses a key word, which controls letter substitution depending on which letter of the key word is used. In the mid-19th century Charles Babbage showed that the Vigenère cipher was vulnerable to Kasiski examination, but this was first published about ten years later by Friedrich Kasiski.[29]
Although frequency analysis can be a powerful and general technique against many ciphers, encryption has still often been effective in practice, as many a would-be cryptanalyst was unaware of the technique. Breaking a message without using frequency analysis essentially required knowledge of the cipher used and perhaps of the key involved, thus making espionage, bribery, burglary, defection, etc., more attractive approaches to the cryptanalytically uninformed. It was finally explicitly recognized in the 19th century that secrecy of a cipher's algorithm is not a sensible nor practical safeguard of message security; in fact, it was further realized that any adequate cryptographic scheme (including ciphers) should remain secure even if the adversary fully understands the cipher algorithm itself. Security of the key used should alone be sufficient for a good cipher to maintain confidentiality under an attack. This fundamental principle was first explicitly stated in 1883 by Auguste Kerckhoffs and is generally called Kerckhoffs's Principle; alternatively and more bluntly, it was restated by Claude Shannon, the inventor of information theory and the fundamentals of theoretical cryptography, as Shannon's Maxim—'the enemy knows the system'.
Different physical devices and aids have been used to assist with ciphers. One of the earliest may have been the scytale of ancient Greece, a rod supposedly used by the Spartans as an aid for a transposition cipher. In medieval times, other aids were invented such as the cipher grille, which was also used for a kind of steganography. With the invention of polyalphabetic ciphers came more sophisticated aids such as Alberti's own cipher disk, Johannes Trithemius' tabula recta scheme, and Thomas Jefferson's wheel cypher (not publicly known, and reinvented independently by Bazeries around 1900). Many mechanical encryption/decryption devices were invented early in the 20th century, and several patented, among them rotor machines—famously including the Enigma machine used by the German government and military from the late 1920s and during World War II.[30] The ciphers implemented by better quality examples of these machine designs brought about a substantial increase in cryptanalytic difficulty after WWI.[31]
Early computer-era cryptography[edit]
Cryptanalysis of the new mechanical ciphering devices proved to be both difficult and laborious. In the United Kingdom, cryptanalytic efforts at Bletchley Park during WWII spurred the development of more efficient means for carrying out repetitive tasks, such as military code breaking (decryption). This culminated in the development of the Colossus, the world's first fully electronic, digital, programmable computer, which assisted in the decryption of ciphers generated by the German Army's Lorenz SZ40/42 machine.
Extensive open academic research into cryptography is relatively recent, beginning in the mid-1970s. In the early 1970s IBM personnel designed the Data Encryption Standard (DES) algorithm that became the first federal government cryptography standard in the United States.[32] In 1976 Whitfield Diffie and Martin Hellman published the Diffie–Hellman key exchange algorithm.[33] In 1977 the RSA algorithm was published in Martin Gardner's Scientific American column.[34] Since then, cryptography has become a widely used tool in communications, computer networks, and computer security generally.
Some modern cryptographic techniques can only keep their keys secret if certain mathematical problems are intractable, such as the integer factorization or the discrete logarithm problems, so there are deep connections with abstract mathematics. There are very few cryptosystems that are proven to be unconditionally secure. The one-time pad is one, and was proven to be so by Claude Shannon. There are a few important algorithms that have been proven secure under certain assumptions. For example, the infeasibility of factoring extremely large integers is the basis for believing that RSA is secure, and some other systems, but even so, proof of unbreakability is unavailable since the underlying mathematical problem remains open. In practice, these are widely used, and are believed unbreakable in practice by most competent observers. There are systems similar to RSA, such as one by Michael O. Rabin that are provably secure provided factoring n = pq is impossible; it is quite unusable in practice. The discrete logarithm problem is the basis for believing some other cryptosystems are secure, and again, there are related, less practical systems that are provably secure relative to the solvability or insolvability discrete log problem.[35]
As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs. For instance, continuous improvements in computer processing power have increased the scope of brute-force attacks, so when specifying key lengths, the required key lengths are similarly advancing.[36] The potential impact of quantum computing are already being considered by some cryptographic system designers developing post-quantum cryptography.[when?] The announced imminence of small implementations of these machines may be making the need for preemptive caution rather more than merely speculative.[5]
Modern cryptography[edit]
Prior to the early 20th century, cryptography was mainly concerned with linguistic and lexicographic patterns. Since then cryptography has broadened in scope, and now makes extensive use of mathematical subdisciplines, including information theory, computational complexity, statistics, combinatorics, abstract algebra, number theory, and finite mathematics.[37] Cryptography is also a branch of engineering, but an unusual one since it deals with active, intelligent, and malevolent opposition; other kinds of engineering (e.g., civil or chemical engineering) need deal only with neutral natural forces. There is also active research examining the relationship between cryptographic problems and quantum physics.
Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. Many computer ciphers can be characterized by their operation on binary bit sequences (sometimes in groups or blocks), unlike classical and mechanical schemes, which generally manipulate traditional characters (i.e., letters and digits) directly. However, computers have also assisted cryptanalysis, which has compensated to some extent for increased cipher complexity. Nonetheless, good modern ciphers have stayed ahead of cryptanalysis; it is typically the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources, such as memory or CPU capability), while breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible.
Modern cryptography[edit]
Symmetric-key cryptography[edit]
Main article: Symmetric-key algorithm
Symmetric-key cryptography, where a single key is used for encryption and decryption
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976.[33]
One round (out of 8.5) of the IDEA cipher, used in most versions of PGP and OpenPGP compatible software for time-efficient encryption of messages
Symmetric key ciphers are implemented as either block ciphers or stream ciphers. A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs that have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted).[38] Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption[39] to e-mail privacy[40] and secure remote access.[41] Many other block ciphers have been designed and released, with considerable variation in quality. Many, even some designed by capable practitioners, have been thoroughly broken, such as FEAL.[5][42]
Stream ciphers, in contrast to the 'block' type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output stream is created based on a hidden internal state that changes as the cipher operates. That internal state is initially set up using the secret key material. RC4 is a widely used stream cipher.[5] Block ciphers can be used as stream ciphers by generating blocks of a keystream (in place of a Pseudorandom number generator) and applying an XOR operation to each bit of the plaintext with each bit of the keystream.[43]
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key can be used to authenticate the hash value upon receipt;[5][44] this additional complication blocks an attack scheme against bare digest algorithms, and so has been thought worth the effort. Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed-length hash, which can be used in (for example) a digital signature. For good hash functions, an attacker cannot find two messages that produce the same hash. MD4 is a long-used hash function that is now broken; MD5, a strengthened variant of MD4, is also widely used but broken in practice. The US National Security Agency developed the Secure Hash Algorithm series of MD5-like hash functions: SHA-0 was a flawed algorithm that the agency withdrew; SHA-1 is widely deployed and more secure than MD5, but cryptanalysts have identified attacks against it; the SHA-2 family improves on SHA-1, but is vulnerable to clashes as of 2011; and the US standards authority thought it "prudent" from a security perspective to develop a new standard to "significantly improve the robustness of NIST's overall hash algorithm toolkit."[45] Thus, a hash function design competition was meant to select a new U.S. national standard, to be called SHA-3, by 2012. The competition ended on October 2, 2012, when the NIST announced that Keccak would be the new SHA-3 hash algorithm.[46] Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security.
Public-key cryptography[edit]
Main article: Public-key cryptography
Public-key cryptography, where different keys are used for encryption and decryption.
Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps for each ciphertext exchanged as well. The number of keys required increases as the square of the number of network members, which very quickly requires complex key management schemes to keep them all consistent and secret.
Whitfield Diffie and Martin Hellman, authors of the first published paper on public-key cryptography.
In a groundbreaking 1976 paper, Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used—a public key and a private key.[47] A public key system is so constructed that calculation of one key (the 'private key') is computationally infeasible from the other (the 'public key'), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair.[48] The historian David Kahn described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic substitution emerged in the Renaissance".[49]
In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. In a public-key encryption system, the public key is used for encryption, while the private or secret key is used for decryption. While Diffie and Hellman could not find such a system, they showed that public-key cryptography was indeed possible by presenting the Diffie–Hellman key exchange protocol, a solution that is now widely used in secure communications to allow two parties to secretly agree on a shared encryption key.[33]
The X.509 standard defines the most commonly used format for public key certificates.[50]
Diffie and Hellman's publication sparked widespread academic efforts in finding a practical public-key encryption system. This race was finally won in 1978 by Ronald Rivest, Adi Shamir, and Len Adleman, whose solution has since become known as the RSA algorithm.[51]
The Diffie–Hellman and RSA algorithms, in addition to being the first publicly known examples of high-quality public-key algorithms, have been among the most widely used. Other asymmetric-key algorithms include the Cramer–Shoup cryptosystem, ElGamal encryption, and various elliptic curve techniques.[citation needed]
A document published in 1997 by the Government Communications Headquarters (GCHQ), a British intelligence organization, revealed that cryptographers at GCHQ had anticipated several academic developments.[52] Reportedly, around 1970, James H. Ellis had conceived the principles of asymmetric key cryptography. In 1973, Clifford Cocks invented a solution that was very similar in design rationale to RSA.[52][53] In 1974, Malcolm J. Williamson is claimed to have developed the Diffie–Hellman key exchange.[54]
In this example the message is only signed and not encrypted. 1) Alice signs a message with her private key. 2) Bob can verify that Alice sent the message and that the message has not been modified.
Public-key cryptography is also used for implementing digital signature schemes. A digital signature is reminiscent of an ordinary signature; they both have the characteristic of being easy for a user to produce, but difficult for anyone else to forge. Digital signatures can also be permanently tied to the content of the message being signed; they cannot then be 'moved' from one document to another, for any attempt will be detectable. In digital signature schemes, there are two algorithms: one for signing, in which a secret key is used to process the message (or a hash of the message, or both), and one for verification, in which the matching public key is used with the message to check the validity of the signature. RSA and DSA are two of the most popular digital signature schemes. Digital signatures are central to the operation of public key infrastructures and many network security schemes (e.g., SSL/TLS, many VPNs, etc.).[42]
Public-key algorithms are most often based on the computational complexity of "hard" problems, often from number theory. For example, the hardness of RSA is related to the integer factorization problem, while Diffie–Hellman and DSA are related to the discrete logarithm problem. The security of elliptic curve cryptography is based on number theoretic problems involving elliptic curves. Because of the difficulty of the underlying problems, most public-key algorithms involve operations such as modular multiplication and exponentiation, which are much more computationally expensive than the techniques used in most block ciphers, especially with typical key sizes. As a result, public-key cryptosystems are commonly hybrid cryptosystems, in which a fast high-quality symmetric-key encryption algorithm is used for the message itself, while the relevant symmetric key is sent with the message, but encrypted using a public-key algorithm. Similarly, hybrid signature schemes are often used, in which a cryptographic hash function is computed, and only the resulting hash is digitally signed.[5]
Cryptographic hash functions[edit]
Cryptographic hash functions are functions that take a variable-length input and return a fixed-length output, which can be used in, for example, a digital signature. For a hash function to be secure, it must be difficult to compute two inputs that hash to the same value (collision resistance) and to compute an input that hashes to a given output (preimage resistance). MD4 is a long-used hash function that is now broken; MD5, a strengthened variant of MD4, is also widely used but broken in practice. The US National Security Agency developed the Secure Hash Algorithm series of MD5-like hash functions: SHA-0 was a flawed algorithm that the agency withdrew; SHA-1 is widely deployed and more secure than MD5, but cryptanalysts have identified attacks against it; the SHA-2 family improves on SHA-1, but is vulnerable to clashes as of 2011; and the US standards authority thought it "prudent" from a security perspective to develop a new standard to "significantly improve the robustness of NIST's overall hash algorithm toolkit."[45] Thus, a hash function design competition was meant to select a new U.S. national standard, to be called SHA-3, by 2012. The competition ended on October 2, 2012, when the NIST announced that Keccak would be the new SHA-3 hash algorithm.[46] Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security.
Cryptanalysis[edit]
Main article: Cryptanalysis
Variants of the Enigma machine, used by Germany's military and civil authorities from the late 1920s through World War II, implemented a complex electro-mechanical polyalphabetic cipher. Breaking and reading of the Enigma cipher at Poland's Cipher Bureau, for 7 years before the war, and subsequent decryption at Bletchley Park, was important to Allied victory.[13]
The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion.
It is a common misconception that every encryption method can be broken. In connection with his WWII work at Bell Labs, Claude Shannon proved that the one-time pad cipher is unbreakable, provided the key material is truly random, never reused, kept secret from all possible attackers, and of equal or greater length than the message.[55] Most ciphers, apart from the one-time pad, can be broken with enough computational effort by brute force attack, but the amount of effort needed may be exponentially dependent on the key size, as compared to the effort needed to make use of the cipher. In such cases, effective security could be achieved if it is proven that the effort required (i.e., "work factor", in Shannon's terms) is beyond the ability of any adversary. This means it must be shown that no efficient method (as opposed to the time-consuming brute force method) can be found to break the cipher. Since no such proof has been found to date, the one-time-pad remains the only theoretically unbreakable cipher. Although well-implemented one-time-pad encryption cannot be broken, traffic analysis is still possible.
There are a wide variety of cryptanalytic attacks, and they can be classified in any of several ways. A common distinction turns on what Eve (an attacker) knows and what capabilities are available. In a ciphertext-only attack, Eve has access only to the ciphertext (good modern cryptosystems are usually effectively immune to ciphertext-only attacks). In a known-plaintext attack, Eve has access to a ciphertext and its corresponding plaintext (or to many such pairs). In a chosen-plaintext attack, Eve may choose a plaintext and learn its corresponding ciphertext (perhaps many times); an example is gardening, used by the British during WWII. In a chosen-ciphertext attack, Eve may be able to choose ciphertexts and learn their corresponding plaintexts.[5] Finally in a man-in-the-middle attack Eve gets in between Alice (the sender) and Bob (the recipient), accesses and modifies the traffic and then forwards it to the recipient.[56] Also important, often overwhelmingly so, are mistakes (generally in the design or use of one of the protocols involved).
Poznań monument (center) to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
Cryptanalysis of symmetric-key ciphers typically involves looking for attacks against the block ciphers or stream ciphers that are more efficient than any attack that could be against a perfect cipher. For example, a simple brute force attack against DES requires one known plaintext and 255 decryptions, trying approximately half of the possible keys, to reach a point at which chances are better than even that the key sought will have been found. But this may not be enough assurance; a linear cryptanalysis attack against DES requires 243 known plaintexts (with their corresponding ciphertexts) and approximately 243 DES operations.[57] This is a considerable improvement over brute force attacks.
Public-key algorithms are based on the computational difficulty of various problems. The most famous of these are the difficulty of integer factorization of semiprimes and the difficulty of calculating discrete logarithms, both of which are not yet proven to be solvable in polynomial time (P) using only a classical Turing-complete computer. Much public-key cryptanalysis concerns designing algorithms in P that can solve these problems, or using other technologies, such as quantum computers. For instance, the best-known algorithms for solving the elliptic curve-based version of discrete logarithm are much more time-consuming than the best-known algorithms for factoring, at least for problems of more or less equivalent size. Thus, to achieve an equivalent strength of encryption, techniques that depend upon the difficulty of factoring large composite numbers, such as the RSA cryptosystem, require larger keys than elliptic curve techniques. For this reason, public-key cryptosystems based on elliptic curves have become popular since their invention in the mid-1990s.
While pure cryptanalysis uses weaknesses in the algorithms themselves, other attacks on cryptosystems are based on actual use of the algorithms in real devices, and are called side-channel attacks. If a cryptanalyst has access to, for example, the amount of time the device took to encrypt a number of plaintexts or report an error in a password or PIN character, they may be able to use a timing attack to break a cipher that is otherwise resistant to analysis. An attacker might also study the pattern and length of messages to derive valuable information; this is known as traffic analysis[58] and can be quite useful to an alert adversary. Poor administration of a cryptosystem, such as permitting too short keys, will make any system vulnerable, regardless of other virtues. Social engineering and other attacks against humans (e.g., bribery, extortion, blackmail, espionage, rubber-hose cryptanalysis or torture) are usually employed due to being more cost-effective and feasible to perform in a reasonable amount of time compared to pure cryptanalysis by a high margin.
Cryptographic primitives[edit]
Much of the theoretical work in cryptography concerns cryptographic primitives—algorithms with basic cryptographic properties—and their relationship to other cryptographic problems. More complicated cryptographic tools are then built from these basic primitives. These primitives provide fundamental properties, which are used to develop more complex tools called cryptosystems or cryptographic protocols, which guarantee one or more high-level security properties. Note, however, that the distinction between cryptographic primitives and cryptosystems, is quite arbitrary; for example, the RSA algorithm is sometimes considered a cryptosystem, and sometimes a primitive. Typical examples of cryptographic primitives include pseudorandom functions, one-way functions, etc.
Cryptosystems[edit]
Main article: List of cryptosystems
One or more cryptographic primitives are often used to develop a more complex algorithm, called a cryptographic system, or cryptosystem. Cryptosystems (e.g., El-Gamal encryption) are designed to provide particular functionality (e.g., public key encryption) while guaranteeing certain security properties (e.g., chosen-plaintext attack (CPA) security in the random oracle model). Cryptosystems use the properties of the underlying cryptographic primitives to support the system's security properties. As the distinction between primitives and cryptosystems is somewhat arbitrary, a sophisticated cryptosystem can be derived from a combination of several more primitive cryptosystems. In many cases, the cryptosystem's structure involves back and forth communication among two or more parties in space (e.g., between the sender of a secure message and its receiver) or across time (e.g., cryptographically protected backup data). Such cryptosystems are sometimes called cryptographic protocols.
Some widely known cryptosystems include RSA, Schnorr signature, ElGamal encryption, and Pretty Good Privacy (PGP). More complex cryptosystems include electronic cash[59] systems, signcryption systems, etc. Some more 'theoretical'[clarification needed] cryptosystems include interactive proof systems,[60] (like zero-knowledge proofs)[61] and systems for secret sharing,[62][63].
Lightweight cryptography[edit]
Lightweight cryptography (LWC) concerns cryptographic algorithms developed for a strictly constrained environment. The growth of Internet of Things (IoT) has spiked research into the development of lightweight algorithms that are better suited for the environment. An IoT environment requires strict constraints on power consumption, processing power, and security.[64] Algorithms such as PRESENT, AES, and SPECK are examples of the many LWC algorithms that have been developed to achieve the standard set by the National Institute of Standards and Technology.[65]
Applications[edit]
This section needs expansion. You can help by adding to it. (December 2021)
Main category: Applications of cryptography
Cryptography is widely used on the internet to help protect user-data and prevent eavesdropping. To ensure secrecy during transmission, many systems use private key cryptography to protect transmitted information. With public-key systems, one can maintain secrecy without a master key or a large number of keys.[66] But, some algorithms like Bitlocker and Veracrypt are generally not private-public key cryptography. For example, Veracrypt uses a password hash to generate the single private key. However, it can be configured to run in public-private key systems. The C++ opensource encryption library OpenSSL provides free and opensource encryption software and tools. The most commonly used encryption cipher suit is AES,[67] as it has hardware acceleration for all x86 based processors that has AES-NI. A close contender is ChaCha20-Poly1305, which is a stream cipher, however it is commonly used for mobile devices as they are ARM based which does not feature AES-NI instruction set extension.
Cybersecurity[edit]
Cryptography can be used to secure communications by encrypting them. Websites use encryption via HTTPS.[68] "End-to-end" encryption, where only sender and receiver can read messages, is implemented for email in Pretty Good Privacy and for secure messaging in general in WhatsApp, Signal and Telegram.[68]
Operating systems use encryption to keep passwords secret, conceal parts of the system, and ensure that software updates are truly from the system maker.[68] Instead of storing plaintext passwords, computer systems store hashes thereof; then, when a user logs in, the system passes the given password through a cryptographic hash function and compares it to the hashed value on file. In this manner, neither the system nor an attacker has at any point access to the password in plaintext.[68]
Encryption is sometimes used to encrypt one's entire drive. For example, University College London has implemented BitLocker (a program by Microsoft) to render drive data opaque without users logging in.[68]
Cryptocurrencies and cryptoeconomics[edit]
Cryptographic techniques enable cryptocurrency technologies, such as distributed ledger technologies (e.g., blockchains), which finance cryptoeconomics applications such as decentralized finance (DeFi). Key cryptographic techniques that enable cryptocurrencies and cryptoeconomics include, but are not limited to: cryptographic keys, cryptographic hash function, asymmetric (public key) encryption, Multi-Factor Authentication (MFA), End-to-End Encryption (E2EE), and Zero Knowledge Proofs (ZKP).
Legal issues[edit]
See also: Cryptography laws in different nations
Prohibitions[edit]
Cryptography has long been of interest to intelligence gathering and law enforcement agencies.[9] Secret communications may be criminal or even treasonous.[citation needed] Because of its facilitation of privacy, and the diminution of privacy attendant on its prohibition, cryptography is also of considerable interest to civil rights supporters. Accordingly, there has been a history of controversial legal issues surrounding cryptography, especially since the advent of inexpensive computers has made widespread access to high-quality cryptography possible.
In some countries, even the domestic use of cryptography is, or has been, restricted. Until 1999, France significantly restricted the use of cryptography domestically, though it has since relaxed many of these rules. In China and Iran, a license is still required to use cryptography.[7] Many countries have tight restrictions on the use of cryptography. Among the more restrictive are laws in Belarus, Kazakhstan, Mongolia, Pakistan, Singapore, Tunisia, and Vietnam.[69]
In the United States, cryptography is legal for domestic use, but there has been much conflict over legal issues related to cryptography.[9] One particularly important issue has been the export of cryptography and cryptographic software and hardware. Probably because of the importance of cryptanalysis in World War II and an expectation that cryptography would continue to be important for national security, many Western governments have, at some point, strictly regulated export of cryptography. After World War II, it was illegal in the US to sell or distribute encryption technology overseas; in fact, encryption was designated as auxiliary military equipment and put on the United States Munitions List.[70] Until the development of the personal computer, asymmetric key algorithms (i.e., public key techniques), and the Internet, this was not especially problematic. However, as the Internet grew and computers became more widely available, high-quality encryption techniques became well known around the globe.
Export controls[edit]
Main article: Export of cryptography
In the 1990s, there were several challenges to US export regulation of cryptography. After the source code for Philip Zimmermann's Pretty Good Privacy (PGP) encryption program found its way onto the Internet in June 1991, a complaint by RSA Security (then called RSA Data Security, Inc.) resulted in a lengthy criminal investigation of Zimmermann by the US Customs Service and the FBI, though no charges were ever filed.[71][72] Daniel J. Bernstein, then a graduate student at UC Berkeley, brought a lawsuit against the US government challenging some aspects of the restrictions based on free speech grounds. The 1995 case Bernstein v. United States ultimately resulted in a 1999 decision that printed source code for cryptographic algorithms and systems was protected as free speech by the United States Constitution.[73]
In 1996, thirty-nine countries signed the Wassenaar Arrangement, an arms control treaty that deals with the export of arms and "dual-use" technologies such as cryptography. The treaty stipulated that the use of cryptography with short key-lengths (56-bit for symmetric encryption, 512-bit for RSA) would no longer be export-controlled.[74] Cryptography exports from the US became less strictly regulated as a consequence of a major relaxation in 2000;[75] there are no longer very many restrictions on key sizes in US-exported mass-market software. Since this relaxation in US export restrictions, and because most personal computers connected to the Internet include US-sourced web browsers such as Firefox or Internet Explorer, almost every Internet user worldwide has potential access to quality cryptography via their browsers (e.g., via Transport Layer Security). The Mozilla Thunderbird and Microsoft Outlook E-mail client programs similarly can transmit and receive emails via TLS, and can send and receive email encrypted with S/MIME. Many Internet users do not realize that their basic application software contains such extensive cryptosystems. These browsers and email programs are so ubiquitous that even governments whose intent is to regulate civilian use of cryptography generally do not find it practical to do much to control distribution or use of cryptography of this quality, so even when such laws are in force, actual enforcement is often effectively impossible.[citation needed]
NSA involvement[edit]
NSA headquarters in Fort Meade, Maryland
See also: Clipper chip
Another contentious issue connected to cryptography in the United States is the influence of the National Security Agency on cipher development and policy.[9] The NSA was involved with the design of DES during its development at IBM and its consideration by the National Bureau of Standards as a possible Federal Standard for cryptography.[76] DES was designed to be resistant to differential cryptanalysis,[77] a powerful and general cryptanalytic technique known to the NSA and IBM, that became publicly known only when it was rediscovered in the late 1980s.[78] According to Steven Levy, IBM discovered differential cryptanalysis,[72] but kept the technique secret at the NSA's request. The technique became publicly known only when Biham and Shamir re-discovered and announced it some years later. The entire affair illustrates the difficulty of determining what resources and knowledge an attacker might actually have.
Another instance of the NSA's involvement was the 1993 Clipper chip affair, an encryption microchip intended to be part of the Capstone cryptography-control initiative. Clipper was widely criticized by cryptographers for two reasons. The cipher algorithm (called Skipjack) was then classified (declassified in 1998, long after the Clipper initiative lapsed). The classified cipher caused concerns that the NSA had deliberately made the cipher weak in order to assist its intelligence efforts. The whole initiative was also criticized based on its violation of Kerckhoffs's Principle, as the scheme included a special escrow key held by the government for use by law enforcement (i.e. wiretapping).[72]
Digital rights management[edit]
Main article: Digital rights management
Cryptography is central to digital rights management (DRM), a group of techniques for technologically controlling use of copyrighted material, being widely implemented and deployed at the behest of some copyright holders. In 1998, U.S. President Bill Clinton signed the Digital Millennium Copyright Act (DMCA), which criminalized all production, dissemination, and use of certain cryptanalytic techniques and technology (now known or later discovered); specifically, those that could be used to circumvent DRM technological schemes.[79] This had a noticeable impact on the cryptography research community since an argument can be made that any cryptanalytic research violated the DMCA. Similar statutes have since been enacted in several countries and regions, including the implementation in the EU Copyright Directive. Similar restrictions are called for by treaties signed by World Intellectual Property Organization member-states.
The United States Department of Justice and FBI have not enforced the DMCA as rigorously as had been feared by some, but the law, nonetheless, remains a controversial one. Niels Ferguson, a well-respected cryptography researcher, has publicly stated that he will not release some of his research into an Intel security design for fear of prosecution under the DMCA.[80] Cryptologist Bruce Schneier has argued that the DMCA encourages vendor lock-in, while inhibiting actual measures toward cyber-security.[81] Both Alan Cox (longtime Linux kernel developer) and Edward Felten (and some of his students at Princeton) have encountered problems related to the Act. Dmitry Sklyarov was arrested during a visit to the US from Russia, and jailed for five months pending trial for alleged violations of the DMCA arising from work he had done in Russia, where the work was legal. In 2007, the cryptographic keys responsible for Blu-ray and HD DVD content scrambling were discovered and released onto the Internet. In both cases, the Motion Picture Association of America sent out numerous DMCA takedown notices, and there was a massive Internet backlash[10] triggered by the perceived impact of such notices on fair use and free speech.
Forced disclosure of encryption keys[edit]
Main article: Key disclosure law
In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to decrypt files or hand over passwords that protect encryption keys. Failure to comply is an offense in its own right, punishable on conviction by a two-year jail sentence or up to five years in cases involving national security.[8] Successful prosecutions have occurred under the Act; the first, in 2009,[82] resulted in a term of 13 months' imprisonment.[83] Similar forced disclosure laws in Australia, Finland, France, and India compel individual suspects under investigation to hand over encryption keys or passwords during a criminal investigation.
In the United States, the federal criminal case of United States v. Fricosu addressed whether a search warrant can compel a person to reveal an encryption passphrase or password.[84] The Electronic Frontier Foundation (EFF) argued that this is a violation of the protection from self-incrimination given by the Fifth Amendment.[85] In 2012, the court ruled that under the All Writs Act, the defendant was required to produce an unencrypted hard drive for the court.[86]
In many jurisdictions, the legal status of forced disclosure remains unclear.
The 2016 FBI–Apple encryption dispute concerns the ability of courts in the United States to compel manufacturers' assistance in unlocking cell phones whose contents are cryptographically protected.
As a potential counter-measure to forced disclosure some cryptographic software supports plausible deniability, where the encrypted data is indistinguishable from unused random data (for example such as that of a drive which has been securely wiped).
See also[edit]
Collision attack
Comparison of cryptography libraries
Crypto Wars – Attempts to limit access to strong cryptography
Encyclopedia of Cryptography and Security – Book by Technische Universiteit Eindhoven
Global surveillance – Mass surveillance across national borders
Indistinguishability obfuscation – Type of cryptographic software obfuscation
Information theory – Scientific study of digital information
Outline of cryptography – Overview of and topical guide to cryptography
List of cryptographers
List of important publications in cryptography
List of multiple discoveries
List of unsolved problems in computer science – List of unsolved computational problems
Secure cryptoprocessor
Strong cryptography – Term applied to cryptographic systems that are highly resistant to cryptanalysis
Syllabical and Steganographical Table – Eighteenth-century work believed to be the first cryptography chart – first cryptography chart
World Wide Web Consortium's Web Cryptography API – World Wide Web Consortium cryptography standard
References[edit]
^ Liddell, Henry George; Scott, Robert; Jones, Henry Stuart; McKenzie, Roderick (1984). A Greek-English Lexicon. Oxford University Press.
^ Rivest, Ronald L. (1990). "Cryptography". In J. Van Leeuwen (ed.). Handbook of Theoretical Computer Science. Vol. 1. Elsevier.
^ Bellare, Mihir; Rogaway, Phillip (21 September 2005). "Introduction". Introduction to Modern Cryptography. p. 10.
^ Sadkhan, Sattar B. (December 2013). "Key note lecture multidisciplinary in cryptology and information security". 2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE). pp. 1–2. doi:10.1109/ICECCPCE.2013.6998773. ISBN 978-1-4799-5633-3. S2CID 22378547. Archived from the original on 27 August 2022. Retrieved 20 September 2022.
^ a b c d e f g Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. (1997). Handbook of Applied Cryptography. Taylor & Francis. ISBN 978-0-8493-8523-0.
^ a b Biggs, Norman (2008). Codes: An introduction to Information Communication and Cryptography. Springer. p. 171.
^ a b "Overview per country". Crypto Law Survey. February 2013. Archived from the original on 1 January 2013. Retrieved 26 March 2015.
^ a b "UK Data Encryption Disclosure Law Takes Effect". PC World. 1 October 2007. Archived from the original on 20 January 2012. Retrieved 26 March 2015.
^ a b c d Ranger, Steve (24 March 2015). "The undercover war on your internet secrets: How online surveillance cracked our trust in the web". TechRepublic. Archived from the original on 12 June 2016. Retrieved 12 June 2016.
^ a b Doctorow, Cory (2 May 2007). "Digg users revolt over AACS key". Boing Boing. Archived from the original on 12 May 2015. Retrieved 26 March 2015.
^ Whalen, Terence (1994). "The Code for Gold: Edgar Allan Poe and Cryptography". Representations. University of California Press. 46 (46): 35–57. doi:10.2307/2928778. JSTOR 2928778.
^ Rosenheim, Shawn (1997). The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Johns Hopkins University Press. p. 20. ISBN 978-0801853319.
^ a b c d Kahn, David (1967). The Codebreakers. ISBN 978-0-684-83130-5.
^ "An Introduction to Modern Cryptosystems". Archived from the original on 17 November 2015. Retrieved 12 October 2015.
^ Sharbaf, M.S. (1 November 2011). "Quantum cryptography: An emerging technology in network security". 2011 IEEE International Conference on Technologies for Homeland Security (HST). pp. 13–19. doi:10.1109/THS.2011.6107841. ISBN 978-1-4577-1376-7. S2CID 17915038.
^ "cryptology | Britannica". www.britannica.com. Archived from the original on 10 July 2022. Retrieved 22 June 2022.
^ Oded Goldreich, Foundations of Cryptography, Volume 1: Basic Tools, Cambridge University Press, 2001, ISBN 0-521-79172-3
^ "Cryptology (definition)". Merriam-Webster's Collegiate Dictionary (11th ed.). Merriam-Webster. Retrieved 26 March 2015.
^ Shirey, Rob (May 2000). "Internet Security Glossary". Internet Engineering Task Force. doi:10.17487/RFC2828. RFC 2828. Archived from the original on 18 April 2015. Retrieved 26 March 2015.
^ Military.com (13 May 2021). "What's a Cryptologic Linguist?". Military.com. Retrieved 17 July 2023.
^ Benson, Cummings, Greaves, ed. (January 1988). Linguistics in a Systemic Perspective. John Benjamins Publishing Company. p. 38. ISBN 9789027278760.{{cite book}}: CS1 maint: multiple names: editors list (link)
^ Saltzman, Benjamin A. (1 October 2018). "Vt hkskdkxt: Early Medieval Cryptography, Textual Errors, and Scribal Agency". Speculum. 93 (4): 975–1009. doi:10.1086/698861. ISSN 0038-7134. S2CID 165362817. Archived from the original on 26 February 2022. Retrieved 26 February 2022.
^ I︠A︡shchenko, V.V. (2002). Cryptography: an introduction. AMS Bookstore. p. 6. ISBN 978-0-8218-2986-8.
^ electricpulp.com. "CODES – Encyclopaedia Iranica". www.iranicaonline.org. Archived from the original on 5 March 2017. Retrieved 4 March 2017.
^ Kahn, David (1996). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Simon and Schuster. ISBN 978-1439103555. Archived from the original on 1 July 2023. Retrieved 16 October 2020.
^ Broemeling, Lyle D. (1 November 2011). "An Account of Early Statistical Inference in Arab Cryptology". The American Statistician. 65 (4): 255–257. doi:10.1198/tas.2011.10191. S2CID 123537702.
^ a b Singh, Simon (2000). The Code Book. New York: Anchor Books. pp. 14–20. ISBN 978-0-385-49532-5.
^ a b Al-Kadi, Ibrahim A. (April 1992). "The origins of cryptology: The Arab contributions". Cryptologia. 16 (2): 97–126. doi:10.1080/0161-119291866801.
^ Schrödel, Tobias (October 2008). "Breaking Short Vigenère Ciphers". Cryptologia. 32 (4): 334–337. doi:10.1080/01611190802336097. S2CID 21812933.
^ Hakim, Joy (1995). A History of US: War, Peace and all that Jazz. New York: Oxford University Press. ISBN 978-0-19-509514-2.
^ Gannon, James (2001). Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century. Washington, D.C.: Brassey's. ISBN 978-1-57488-367-1.
^ "The Legacy of DES - Schneier on Security". www.schneier.com. Archived from the original on 23 February 2022. Retrieved 26 January 2022.
^ a b c Diffie, Whitfield; Hellman, Martin (November 1976). "New Directions in Cryptography" (PDF). IEEE Transactions on Information Theory. IT-22 (6): 644–654. CiteSeerX 10.1.1.37.9720. doi:10.1109/tit.1976.1055638. Archived (PDF) from the original on 3 December 2017. Retrieved 16 November 2015.
^ Singh, Simon (1999). The Code Book: The Science of Secrecy From Ancient Egypt To Quantum Cryptography (First Anchor Books ed.). New York: Anchor Books. pp. 278. ISBN 978-0-385-49532-5.
^ Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications), 2005, by Douglas R. Stinson, Chapman and Hall/CRC
^ Blaze, Matt; Diffie, Whitefield; Rivest, Ronald L.; Schneier, Bruce; Shimomura, Tsutomu; Thompson, Eric; Wiener, Michael (January 1996). "Minimal key lengths for symmetric ciphers to provide adequate commercial security". Fortify. Archived from the original on 24 September 2015. Retrieved 26 March 2015.
^ Diffie, W.; Hellman, M. (1 September 2006). "New directions in cryptography". IEEE Transactions on Information Theory. 22 (6): 644–654. doi:10.1109/TIT.1976.1055638. Archived from the original on 19 April 2022. Retrieved 19 April 2022.
^ "FIPS PUB 197: The official Advanced Encryption Standard" (PDF). Computer Security Resource Center. National Institute of Standards and Technology. Archived from the original (PDF) on 7 April 2015. Retrieved 26 March 2015.
^ "NCUA letter to credit unions" (PDF). National Credit Union Administration. July 2004. Archived (PDF) from the original on 12 September 2014. Retrieved 26 March 2015.
^ Finney, Hal; Thayer, Rodney L.; Donnerhacke, Lutz; Callas, Jon (November 1998). "Open PGP Message Format". Internet Engineering Task Force. doi:10.17487/RFC2440. RFC 2440. Archived from the original on 15 March 2015. Retrieved 26 March 2015.
^ Golen, Pawel (19 July 2002). "SSH". WindowSecurity. Archived from the original on 29 October 2009. Retrieved 26 March 2015.
^ a b Schneier, Bruce (1996). Applied Cryptography (2nd ed.). Wiley. ISBN 978-0-471-11709-4.
^ Paar, Christof (2009). Understanding cryptography : a textbook for students and practitioners. Jan Pelzl. Berlin: Springer. p. 123. ISBN 978-3-642-04101-3. OCLC 567365751.
^ Bernstein, Daniel J.; Lange, Tanja (14 September 2017). "Post-quantum cryptography". Nature. 549 (7671): 188–194. Bibcode:2017Natur.549..188B. doi:10.1038/nature23461. ISSN 0028-0836. PMID 28905891. S2CID 4446249. Archived from the original on 10 July 2022. Retrieved 26 August 2022.
^ a b "Notices". Federal Register. 72 (212). 2 November 2007."Archived copy" (PDF). Archived from the original on 28 February 2008. Retrieved 27 January 2009.{{cite web}}: CS1 maint: archived copy as title (link) CS1 maint: bot: original URL status unknown (link)
^ a b "NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition". NIST. National Institute of Standards and Technology. 2 October 2012. Archived from the original on 2 April 2015. Retrieved 26 March 2015.
^ Diffie, Whitfield; Hellman, Martin (8 June 1976). "Multi-user cryptographic techniques". AFIPS Proceedings. 45: 109–112. doi:10.1145/1499799.1499815. S2CID 13210741.
^ Ralph Merkle was working on similar ideas at the time and encountered publication delays, and Hellman has suggested that the term used should be Diffie–Hellman–Merkle aysmmetric key cryptography.
^ Kahn, David (Fall 1979). "Cryptology Goes Public". Foreign Affairs. 58 (1): 141–159. doi:10.2307/20040343. JSTOR 20040343.
^ "Using Client-Certificate based authentication with NGINX on Ubuntu". SSLTrust. Archived from the original on 26 August 2019. Retrieved 13 June 2019.
^ Rivest, Ronald L.; Shamir, A.; Adleman, L. (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM. 21 (2): 120–126. CiteSeerX 10.1.1.607.2677. doi:10.1145/359340.359342. S2CID 2873616."Archived copy" (PDF). Archived from the original (PDF) on 16 November 2001. Retrieved 20 April 2006.{{cite web}}: CS1 maint: archived copy as title (link)Previously released as an MIT "Technical Memo" in April 1977, and published in Martin Gardner's Scientific American Mathematical recreations column
^ a b Wayner, Peter (24 December 1997). "British Document Outlines Early Encryption Discovery". The New York Times. Archived from the original on 27 June 2017. Retrieved 26 March 2015.
^ Cocks, Clifford (20 November 1973). "A Note on 'Non-Secret Encryption'" (PDF). CESG Research Report. Archived (PDF) from the original on 27 July 2011. Retrieved 22 July 2009.
^ Singh, Simon (1999). The Code Book. Doubleday. pp. 279–292. ISBN 9780385495318.
^ Shannon, Claude; Weaver, Warren (1963). The Mathematical Theory of Communication. University of Illinois Press. ISBN 978-0-252-72548-7.
^ "An Example of a Man-in-the-middle Attack Against Server Authenticated SSL-sessions" (PDF). Archived (PDF) from the original on 3 June 2016. Retrieved 13 October 2015.
^ Junod, Pascal (2001). "On the Complexity of Matsui's Attack". Selected Areas in Cryptography (PDF). Lecture Notes in Computer Science. Vol. 2259. pp. 199–211. doi:10.1007/3-540-45537-X_16. ISBN 978-3-540-43066-7.
^ Song, Dawn; Wagner, David A.; Tian, Xuqing (2001). "Timing Analysis of Keystrokes and Timing Attacks on SSH" (PDF). Tenth USENIX Security Symposium.
^ Brands, S. (1994). "Untraceable Off-line Cash in Wallet with Observers". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 302–318. doi:10.1007/3-540-48329-2_26. ISBN 978-3-540-57766-9. Archived from the original on 26 July 2011.
^ Babai, László (1985). "Trading group theory for randomness". Proceedings of the seventeenth annual ACM symposium on Theory of computing - STOC '85. pp. 421–429. CiteSeerX 10.1.1.130.3397. doi:10.1145/22145.22192. ISBN 978-0-89791-151-1. S2CID 17981195.
^ Goldwasser, S.; Micali, S.; Rackoff, C. (1989). "The Knowledge Complexity of Interactive Proof Systems". SIAM Journal on Computing. 18 (1): 186–208. CiteSeerX 10.1.1.397.4002. doi:10.1137/0218012.
^ Blakley, G. (June 1979). "Safeguarding cryptographic keys". Proceedings of AFIPS 1979. 48: 313–317.
^ Shamir, A. (1979). "How to share a secret". Communications of the ACM. 22 (11): 612–613. doi:10.1145/359168.359176. S2CID 16321225.
^ Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchana, William J. (2 November 2020). "Recent Advances and Trends in Lightweight Cryptography for IoT Security". 2020 16th International Conference on Network and Service Management (CNSM). Izmir, Turkey: IEEE. pp. 1–5. doi:10.23919/CNSM50824.2020.9269083. ISBN 978-3-903176-31-7. S2CID 227277538. Archived from the original on 24 April 2021. Retrieved 24 April 2021.
^ Thakor, Vishal A.; Razzaque, Mohammad Abdur; Khandaker, Muhammad R. A. (2021). "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities". IEEE Access. 9: 28177–28193. Bibcode:2021IEEEA...928177T. doi:10.1109/ACCESS.2021.3052867. ISSN 2169-3536. S2CID 232042514.
^ Cohen, Fred (1995). "2.4 - Applications of Cryptography". all.net. Archived from the original on 24 August 1999. Retrieved 21 December 2021.
^ "4 Common Encryption Methods to Shield Sensitive Data From Prying Eyes". GetApp. Archived from the original on 14 May 2022. Retrieved 14 May 2022.
^ a b c d e Chamberlain, Austin (12 March 2017). "Applications of Cryptography | UCL Risky Business". blogs.ucl.ac.uk. Archived from the original on 26 February 2018. Retrieved 21 December 2021.
^ "6.5.1 What Are the Cryptographic Policies of Some Countries?". RSA Laboratories. Archived from the original on 16 April 2015. Retrieved 26 March 2015.
^ Rosenoer, Jonathan (1995). "Cryptography & Speech". CyberLaw."Archived copy". Archived from the original on 1 December 2005. Retrieved 23 June 2006.{{cite web}}: CS1 maint: archived copy as title (link)
^ "Case Closed on Zimmermann PGP Investigation". IEEE Computer Society's Technical Committee on Security and Privacy. 14 February 1996. Archived from the original on 11 June 2010. Retrieved 26 March 2015.
^ a b c Levy, Steven (2001). Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age. Penguin Books. p. 56. ISBN 978-0-14-024432-8. OCLC 244148644.
^ "Bernstein v USDOJ". Electronic Privacy Information Center. United States Court of Appeals for the Ninth Circuit. 6 May 1999. Archived from the original on 13 August 2009. Retrieved 26 March 2015.
^ "Dual-use List – Category 5 – Part 2 – "Information Security"" (PDF). Wassenaar Arrangement. Archived from the original on 26 September 2018. Retrieved 26 March 2015.
^ ".4 United States Cryptography Export/Import Laws". RSA Laboratories. Archived from the original on 31 March 2015. Retrieved 26 March 2015.
^ Schneier, Bruce (15 June 2000). "The Data Encryption Standard (DES)". Crypto-Gram. Archived from the original on 2 January 2010. Retrieved 26 March 2015.
^ Coppersmith, D. (May 1994). "The Data Encryption Standard (DES) and its strength against attacks" (PDF). IBM Journal of Research and Development. 38 (3): 243–250. doi:10.1147/rd.383.0243. Archived from the original on 4 March 2016. Retrieved 26 March 2015.
^ Biham, E.; Shamir, A. (1991). "Differential cryptanalysis of DES-like cryptosystems". Journal of Cryptology. 4 (1): 3–72. doi:10.1007/bf00630563. S2CID 206783462.
^ "The Digital Millennium Copyright Act of 1998" (PDF). United States Copyright Office. Archived (PDF) from the original on 8 August 2007. Retrieved 26 March 2015.
^ Ferguson, Niels (15 August 2001). "Censorship in action: why I don't publish my HDCP results". Archived from the original on 1 December 2001. Retrieved 16 February 2009.
^ Schneier, Bruce (6 August 2001). "Arrest of Computer Researcher Is Arrest of First Amendment Rights". InternetWeek. Archived from the original on 7 March 2017. Retrieved 7 March 2017.
^ Williams, Christopher (11 August 2009). "Two convicted for refusal to decrypt data". The Register. Archived from the original on 17 March 2015. Retrieved 26 March 2015.
^ Williams, Christopher (24 November 2009). "UK jails schizophrenic for refusal to decrypt files". The Register. Archived from the original on 26 March 2015. Retrieved 26 March 2015.
^ Ingold, John (4 January 2012). "Password case reframes Fifth Amendment rights in context of digital world". The Denver Post. Archived from the original on 2 April 2015. Retrieved 26 March 2015.
^ Leyden, John (13 July 2011). "US court test for rights not to hand over crypto keys". The Register. Archived from the original on 24 October 2014. Retrieved 26 March 2015.
^ "Order Granting Application under the All Writs Act Requiring Defendant Fricosu to Assist in the Execution of Previously Issued Search Warrants" (PDF). United States District Court for the District of Colorado. Archived (PDF) from the original on 9 June 2021. Retrieved 26 March 2015.
Further reading[edit]
Further information: Books on cryptography
Arbib, Jonathan; Dwyer, John (2011). Discrete Mathematics for Cryptography. Algana Publishing. ISBN 978-1-907934-01-8.
Becket, B (1988). Introduction to Cryptology. Blackwell Scientific Publications. ISBN 978-0-632-01836-9. OCLC 16832704. Excellent coverage of many classical ciphers and cryptography concepts and of the "modern" DES and RSA systems.
Cryptography and Mathematics by Bernhard Esslinger, 200 pages, part of the free open-source package CrypTool, "PDF download" (PDF). Archived from the original on 22 July 2011. Retrieved 23 December 2013.{{cite web}}: CS1 maint: bot: original URL status unknown (link). CrypTool is the most widespread e-learning program about cryptography and cryptanalysis, open source.
In Code: A Mathematical Journey by Sarah Flannery (with David Flannery). Popular account of Sarah's award-winning project on public-key cryptography, co-written with her father.
James Gannon, Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century, Washington, D.C., Brassey's, 2001, ISBN 1-57488-367-4.
Oded Goldreich, Foundations of Cryptography Archived 9 August 2016 at the Wayback Machine, in two volumes, Cambridge University Press, 2001 and 2004.
Alvin's Secret Code by Clifford B. Hicks (children's novel that introduces some basic cryptography and cryptanalysis).
Introduction to Modern Cryptography Archived 16 October 2009 at the Wayback Machine by Jonathan Katz and Yehuda Lindell.
Ibrahim A. Al-Kadi, "The Origins of Cryptology: the Arab Contributions," Cryptologia, vol. 16, no. 2 (April 1992), pp. 97–126.
Christof Paar, Jan Pelzl, Understanding Cryptography, A Textbook for Students and Practitioners. Archived 31 October 2020 at the Wayback Machine Springer, 2009. (Slides, online cryptography lectures and other information are available on the companion web site.) Very accessible introduction to practical cryptography for non-mathematicians.
"Max Planck Encyclopedia of Public International Law". Archived from the original on 1 May 2018. Retrieved 15 December 2021., giving an overview of international law issues regarding cryptography.
Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDF download Archived 24 September 2009 at the Wayback Machine.
Stallings, William (2013). Cryptography and Network Security: Principles and Practice (6th ed.). Prentice Hall. ISBN 978-0-13-335469-0.
Tenzer, Theo (2021): Super Secreto – The Third Epoch of Cryptography: Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone, Norderstedt, ISBN 978-3755761174.
Johann-Christoph Woltag, 'Coded Communications (Encryption)' in Rüdiger Wolfrum (ed) Max Planck Encyclopedia of Public International Law (Oxford University Press 2009).
External links[edit]
Wikiquote has quotations related to Cryptography.
Wikibooks has more on the topic of: Cryptography
At Wikiversity, you can learn more and teach others about Cryptography at the Department of Cryptography
Wikisource has the text of the 1911 Encyclopædia Britannica article "Cryptography".
Library resources about Cryptography
Online books
Resources in your library
Resources in other libraries
The dictionary definition of cryptography at Wiktionary
Media related to Cryptography at Wikimedia Commons
Cryptography on In Our Time at the BBC
Crypto Glossary and Dictionary of Technical Cryptography Archived 4 July 2022 at the Wayback Machine
A Course in Cryptography by Raphael Pass & Abhi Shelat – offered at Cornell in the form of lecture notes.
For more on the use of cryptographic elements in fiction, see: Dooley, John F., William and Marilyn Ingersoll Professor of Computer Science, Knox College (23 August 2012). "Cryptology in Fiction". Archived from the original on 29 July 2020. Retrieved 20 February 2015.{{cite web}}: CS1 maint: multiple names: authors list (link)
The George Fabyan Collection at the Library of Congress has early editions of works of seventeenth-century English literature, publications relating to cryptography.
Articles relating to Cryptography
vtePublic-key cryptographyAlgorithmsInteger factorization
Benaloh
Blum–Goldwasser
Cayley–Purser
Damgård–Jurik
GMR
Goldwasser–Micali
Naccache–Stern
Paillier
Rabin
RSA
Okamoto–Uchiyama
Schmidt–Samoa
Discrete logarithm
BLS
Cramer–Shoup
DH
DSA
ECDH
X25519
X448
ECDSA
EdDSA
Ed25519
Ed448
ECMQV
EKE
ElGamal
signature scheme
MQV
Schnorr
SPEKE
SRP
STS
Lattice/SVP/CVP/LWE/SIS
BLISS
Kyber
NewHope
NTRUEncrypt
NTRUSign
RLWE-KEX
RLWE-SIG
Others
AE
CEILIDH
EPOC
HFE
IES
Lamport
McEliece
Merkle–Hellman
Naccache–Stern knapsack cryptosystem
Three-pass protocol
XTR
Theory
Discrete logarithm cryptography
Elliptic-curve cryptography
Hash-based cryptography
Non-commutative cryptography
RSA problem
Trapdoor function
Standardization
CRYPTREC
IEEE P1363
NESSIE
NSA Suite B
Post-Quantum Cryptography
Topics
Digital signature
OAEP
Fingerprint
PKI
Web of trust
Key size
Identity-based cryptography
Post-quantum cryptography
OpenPGP card
vteCryptographyGeneral
History of cryptography
Outline of cryptography
Cryptographic protocol
Authentication protocol
Cryptographic primitive
Cryptanalysis
Cryptocurrency
Cryptosystem
Cryptographic nonce
Cryptovirology
Hash function
Cryptographic hash function
Key derivation function
Digital signature
Kleptography
Key (cryptography)
Key exchange
Key generator
Key schedule
Key stretching
Keygen
Cryptojacking malware
Ransomware
Random number generation
Cryptographically secure pseudorandom number generator (CSPRNG)
Pseudorandom noise (PRN)
Secure channel
Insecure channel
Subliminal channel
Encryption
Decryption
End-to-end encryption
Harvest now, decrypt later
Information-theoretic security
Plaintext
Codetext
Ciphertext
Shared secret
Trapdoor function
Trusted timestamping
Key-based routing
Onion routing
Garlic routing
Kademlia
Mix network
Mathematics
Cryptographic hash function
Block cipher
Stream cipher
Symmetric-key algorithm
Authenticated encryption
Public-key cryptography
Quantum key distribution
Quantum cryptography
Post-quantum cryptography
Message authentication code
Random numbers
Steganography
Category
vteCryptographic hash functions and message authentication codes
List
Comparison
Known attacks
Common functions
MD5 (compromised)
SHA-1 (compromised)
SHA-2
SHA-3
BLAKE2
SHA-3 finalists
BLAKE
Grøstl
JH
Skein
Keccak (winner)
Other functions
BLAKE3
CubeHash
ECOH
FSB
Fugue
GOST
HAS-160
HAVAL
Kupyna
LSH
Lane
MASH-1
MASH-2
MD2
MD4
MD6
MDC-2
N-hash
RIPEMD
RadioGatún
SIMD
SM3
SWIFFT
Shabal
Snefru
Streebog
Tiger
VSH
Whirlpool
Password hashing/key stretching functions
Argon2
Balloon
bcrypt
Catena
crypt
LM hash
Lyra2
Makwa
PBKDF2
scrypt
yescrypt
General purposekey derivation functions
HKDF
KDF1/KDF2
MAC functions
CBC-MAC
DAA
GMAC
HMAC
NMAC
OMAC/CMAC
PMAC
Poly1305
SipHash
UMAC
VMAC
Authenticatedencryption modes
CCM
ChaCha20-Poly1305
CWC
EAX
GCM
IAPM
OCB
Attacks
Collision attack
Preimage attack
Birthday attack
Brute-force attack
Rainbow table
Side-channel attack
Length extension attack
Design
Avalanche effect
Hash collision
Merkle–Damgård construction
Sponge function
HAIFA construction
Standardization
CAESAR Competition
CRYPTREC
NESSIE
NIST hash function competition
Password Hashing Competition
Utilization
Hash-based cryptography
Merkle tree
Message authentication
Proof of work
Salt
Pepper
vteCryptographyGeneral
History of cryptography
Outline of cryptography
Cryptographic protocol
Authentication protocol
Cryptographic primitive
Cryptanalysis
Cryptocurrency
Cryptosystem
Cryptographic nonce
Cryptovirology
Hash function
Cryptographic hash function
Key derivation function
Digital signature
Kleptography
Key (cryptography)
Key exchange
Key generator
Key schedule
Key stretching
Keygen
Cryptojacking malware
Ransomware
Random number generation
Cryptographically secure pseudorandom number generator (CSPRNG)
Pseudorandom noise (PRN)
Secure channel
Insecure channel
Subliminal channel
Encryption
Decryption
End-to-end encryption
Harvest now, decrypt later
Information-theoretic security
Plaintext
Codetext
Ciphertext
Shared secret
Trapdoor function
Trusted timestamping
Key-based routing
Onion routing
Garlic routing
Kademlia
Mix network
Mathematics
Cryptographic hash function
Block cipher
Stream cipher
Symmetric-key algorithm
Authenticated encryption
Public-key cryptography
Quantum key distribution
Quantum cryptography
Post-quantum cryptography
Message authentication code
Random numbers
Steganography
Category
vteBlock ciphers (security summary)Commonalgorithms
AES
Blowfish
DES (internal mechanics, Triple DES)
Serpent
SM4
Twofish
Less commonalgorithms
ARIA
Camellia
CAST-128
GOST
IDEA
LEA
RC5
RC6
SEED
Skipjack
TEA
XTEA
Otheralgorithms
3-Way
Adiantum
Akelarre
Anubis
BaseKing
BassOmatic
BATON
BEAR and LION
CAST-256
Chiasmus
CIKS-1
CIPHERUNICORN-A
CIPHERUNICORN-E
CLEFIA
CMEA
Cobra
COCONUT98
Crab
Cryptomeria/C2
CRYPTON
CS-Cipher
DEAL
DES-X
DFC
E2
FEAL
FEA-M
FROG
G-DES
Grand Cru
Hasty Pudding cipher
Hierocrypt
ICE
IDEA NXT
Intel Cascade Cipher
Iraqi
Kalyna
KASUMI
KeeLoq
KHAZAD
Khufu and Khafre
KN-Cipher
Kuznyechik
Ladder-DES
LOKI (97, 89/91)
Lucifer
M6
M8
MacGuffin
Madryga
MAGENTA
MARS
Mercy
MESH
MISTY1
MMB
MULTI2
MultiSwap
New Data Seal
NewDES
Nimbus
NOEKEON
NUSH
PRESENT
Prince
Q
RC2
REDOC
Red Pike
S-1
SAFER
SAVILLE
SC2000
SHACAL
SHARK
Simon
Speck
Spectr-H64
Square
SXAL/MBAL
Threefish
Treyfer
UES
xmx
XXTEA
Zodiac
Design
Feistel network
Key schedule
Lai–Massey scheme
Product cipher
S-box
P-box
SPN
Confusion and diffusion
Round
Avalanche effect
Block size
Key size
Key whitening (Whitening transformation)
Attack(cryptanalysis)
Brute-force (EFF DES cracker)
MITM
Biclique attack
3-subset MITM attack
Linear (Piling-up lemma)
Differential
Impossible
Truncated
Higher-order
Differential-linear
Distinguishing (Known-key)
Integral/Square
Boomerang
Mod n
Related-key
Slide
Rotational
Side-channel
Timing
Power-monitoring
Electromagnetic
Acoustic
Differential-fault
XSL
Interpolation
Partitioning
Rubber-hose
Black-bag
Davies
Rebound
Weak key
Tau
Chi-square
Time/memory/data tradeoff
Standardization
AES process
CRYPTREC
NESSIE
Utilization
Initialization vector
Mode of operation
Padding
vteCryptographyGeneral
History of cryptography
Outline of cryptography
Cryptographic protocol
Authentication protocol
Cryptographic primitive
Cryptanalysis
Cryptocurrency
Cryptosystem
Cryptographic nonce
Cryptovirology
Hash function
Cryptographic hash function
Key derivation function
Digital signature
Kleptography
Key (cryptography)
Key exchange
Key generator
Key schedule
Key stretching
Keygen
Cryptojacking malware
Ransomware
Random number generation
Cryptographically secure pseudorandom number generator (CSPRNG)
Pseudorandom noise (PRN)
Secure channel
Insecure channel
Subliminal channel
Encryption
Decryption
End-to-end encryption
Harvest now, decrypt later
Information-theoretic security
Plaintext
Codetext
Ciphertext
Shared secret
Trapdoor function
Trusted timestamping
Key-based routing
Onion routing
Garlic routing
Kademlia
Mix network
Mathematics
Cryptographic hash function
Block cipher
Stream cipher
Symmetric-key algorithm
Authenticated encryption
Public-key cryptography
Quantum key distribution
Quantum cryptography
Post-quantum cryptography
Message authentication code
Random numbers
Steganography
Category
vteStream ciphersWidely used ciphers
A5/1
A5/2
ChaCha
Crypto-1
E0
RC4
eSTREAM PortfolioSoftware
HC-256
Rabbit
Salsa20
SOSEMANUK
Hardware
Grain
MICKEY
Trivium
Other ciphers
Achterbahn (stream cipher)
F-FCSR
FISH
ISAAC
MUGI
ORYX
Panama
Phelix
Pike
Py
QUAD
Scream
SEAL
SNOW
SOBER
SOBER-128
VEST
VMPC
WAKE
Generators
shrinking generator
self-shrinking generator
alternating step generator
Theory
block ciphers in stream mode
shift register
LFSR
NLFSR
T-function
IV
Attacks
correlation attack
correlation immunity
stream cipher attacks
vteCryptographyGeneral
History of cryptography
Outline of cryptography
Cryptographic protocol
Authentication protocol
Cryptographic primitive
Cryptanalysis
Cryptocurrency
Cryptosystem
Cryptographic nonce
Cryptovirology
Hash function
Cryptographic hash function
Key derivation function
Digital signature
Kleptography
Key (cryptography)
Key exchange
Key generator
Key schedule
Key stretching
Keygen
Cryptojacking malware
Ransomware
Random number generation
Cryptographically secure pseudorandom number generator (CSPRNG)
Pseudorandom noise (PRN)
Secure channel
Insecure channel
Subliminal channel
Encryption
Decryption
End-to-end encryption
Harvest now, decrypt later
Information-theoretic security
Plaintext
Codetext
Ciphertext
Shared secret
Trapdoor function
Trusted timestamping
Key-based routing
Onion routing
Garlic routing
Kademlia
Mix network
Mathematics
Cryptographic hash function
Block cipher
Stream cipher
Symmetric-key algorithm
Authenticated encryption
Public-key cryptography
Quantum key distribution
Quantum cryptography
Post-quantum cryptography
Message authentication code
Random numbers
Steganography
Category
vteEspionageAgentsAssets
Agent handling
Cover
Double agent
Field agent
Resident spy
Sleeper agent
Spymaster
Analysis
Intelligence assessment
competing hypotheses
Devices andcommunications
Concealment device
Covert listening device
Cryptography
Cutout
Computer and network surveillance
Cyber spying
Dead drop
Invisible ink
Numbers station
One-way voice link
Phone surveillance
Short-range agent communications
Steganography
microdot
Surveillance tools
Tradecraft andtechniques
Canary trap
Front organization
Limited hangout
Operations
Chinese intelligence activity abroad
Chinese espionage in the United States
Cold War espionage
Recruitment
Black operation
black bag
wetwork
Eavesdropping
SIGINT
MASINT
False flag
Industrial espionage
Interpersonal (HUMINT) intelligence
interrogation
safe house
surveillance
COINTELPRO
MINARET
SHAMROCK
FVEY
Sexpionage
Stay-behind
Targeted surveillance
vteHidden messagesMain
Subliminal message
Audio
Backmasking
Hidden track
Phonetic reversal
Reverse speech
Numeric
Chronogram
Numerology
Theomatics
Bible code
Cryptology
Visual
Fnord
Hidden text
Paranoiac-critical method
Pareidolia
Psychorama
Sacred geometry
Steganography
Visual cryptography
Other
Apophenia
Asemic writing
Clustering illusion
Cryptic crossword
Anagram
Easter egg
Observer-expectancy effect
Pattern recognition
Palindrome
Simulacrum
Synchronicity
Unconscious mind
vteIntelligence managementCollectionHuman
Special reconnaissance
organizations
Clandestine
Asset recruiting
Cell system
Covert action
Direct action
Operational techniques
Espionage
Agents
field
handling
Asset
Black operation
black bag
Concealment device
Cover
Cryptography
Cutout
Dead drop
Defection / Turncoat
Denial and deception
Eavesdropping
False flag
Industrial espionage
Interrogation
Numbers station
One-way voice link
Resident spy
Steganography
Surveillance
Signals (SIGINT)
By alliances, nations and industries
In modern history
Operational platforms by nation
Direction finding
Traffic analysis
TEMPEST
Measurement andsignature (MASINT)
Electro-optical
Geophysical
Nuclear
Radar
Radiofrequency
Materials
Casualty estimation (earthquake)
Other
Cultural (CULTINT)
Financial (FININT)
Geospatial (GEOINT)
Imagery (IMINT)
Market (MARKINT)
Open-source (OSINT)
Technical (TECHINT)
Analysis
Cognitive traps
Competing hypotheses
Target-centric
Words of estimative probability
All-source intelligence
Basic intelligence
Intelligence assessment
Medical intelligence
Military geography
Scientific & Technical intelligence
Dissemination
Intelligence cycle security
Counterintelligence
organizations
Counterintelligence and counter-terrorism organizations
Authority control databases National
Spain
France
BnF data
Israel
United States
Czech Republic
Other
NARA
Retrieved from "https://en.wikipedia.org/w/index.php?title=Cryptography&oldid=1212749356"
Categories: CryptographyApplied mathematicsBanking technologyFormal sciencesHidden categories: CS1 maint: multiple names: editors listCS1: long volume valueCS1 maint: archived copy as titleCS1 maint: bot: original URL status unknownArticles with short descriptionShort description matches WikidataWikipedia indefinitely move-protected pagesWikipedia pending changes protected pagesArticles needing additional references from March 2021All articles needing additional referencesUse dmy dates from September 2015Articles containing Ancient Greek (to 1453)-language textAll articles with vague or ambiguous timeVague or ambiguous time from January 2022All articles with unsourced statementsArticles with unsourced statements from August 2018Wikipedia articles needing clarification from December 2018Articles to be expanded from December 2021All articles to be expandedArticles using small message boxesArticles with unsourced statements from April 2016Articles with unsourced statements from August 2013Webarchive template wayback linksCommons category link is on WikidataCS1 maint: multiple names: authors listArticles with BNE identifiersArticles with BNF identifiersArticles with BNFdata identifiersArticles with J9U identifiersArticles with LCCN identifiersArticles with NKC identifiersArticles with NARA identifiers
This page was last edited on 9 March 2024, at 11:54 (UTC).
Text is available under the Creative Commons Attribution-ShareAlike License 4.0;
additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Privacy policy
About Wikipedia
Disclaimers
Contact Wikipedia
Code of Conduct
Developers
Statistics
Cookie statement
Mobile view
Toggle limited content width
What is cryptography? | IBM
What is cryptography? | IBM
What is cryptography?
Explore IBM cryptography solutions
What is cryptography?
Cryptography is the practice of developing and using coded algorithms to protect and obscure transmitted information so that it may only be read by those with the permission and ability to decrypt it. Put differently, cryptography obscures communications so that unauthorized parties are unable to access them.
In our modern digital age, cryptography has become an essential cybersecurity tool for protecting sensitive information from hackers and other cybercriminals.
Derived from the Greek word “kryptos,” meaning hidden, cryptography literally translates to “hidden writing.” Of course, it can be used to obscure any form of digital communication, including text, images, video or audio. In practice, cryptography is mainly used to transform messages into an unreadable format (known as ciphertext) that can only be decrypted into a readable format (known as plaintext) by the authorized intended recipient through the use of a specific secret key.
Cryptology, which encompasses both cryptography and cryptanalysis, is deeply rooted in computer science and advanced mathematics. The history of cryptography dates back to ancient times when Julius Caesar created the Caesar cipher to obscure the content of his messages from the messengers who carried them in the first century B.C. Today, organizations like the National Institute of Standards and Technology (NIST) continue to develop cryptographic standards for data security.
Ebook
Encryption: Protect your most critical data
Learn how encryption can help safeguard your data against threats and address compliance.
Related content
Subscribe to the IBM Newsletter
Core tenets of modern cryptography
Modern cryptography has grown significantly more advanced over time. However, the general idea remains the same and has coalesced around four main principles.
Confidentiality: Encrypted information can only be accessed by the person for whom it is intended and no one else.
Integrity: Encrypted information cannot be modified in storage or in transit between the sender and the intended receiver without any alterations being detected.
Non-repudiation: The creator/sender of encrypted information cannot deny their intention to send the information.
Authentication: The identities of the sender and receiver, as well as the origin and destination of the information are confirmed.
Why cryptography is important
In today’s digital landscape, cryptography plays a vital role in our daily lives, ensuring that sensitive data like credit card numbers, e-commerce transactions and even WhatsApp messages remain confidential and secure.
On a macro level, advanced cryptography is crucial for maintaining national security, safeguarding classified information from potential threat actors and adversaries.
Common uses for cryptography
The following are some of the most common use cases for cryptography.
Passwords
Cryptography is frequently used to validate password authenticity while also obscuring stored passwords. In this way, services can authenticate passwords without the need to keep a plaintext database of all passwords which might be vulnerable to hackers.
Cryptocurrency
Cryptocurrencies like Bitcoin and Ethereum are built on complex data encryptions that require significant amounts of computational power to decrypt. Through these decryption processes, new coins are “minted” and enter circulation. Cryptocurrencies also rely on advanced cryptography to safeguard crypto wallets, verify transactions and prevent fraud.
Secure web browsing
When browsing secure websites, cryptography protects users from eavesdropping and man-in-the-middle (MitM) attacks. The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols rely on public key cryptography to protect data sent between the web server and client and establish secure communications channels.
Electronic signatures
Electronic signatures, or e-signatures, are used to sign important documents online and are frequently enforceable by law. Electronic signatures created with cryptography can be validated to prevent fraud and forgeries.
Authentication
In situations where identity authentication is necessary, such as logging into an online bank account or accessing a secure network, cryptography can help confirm a verify a user’s identity and authenticate their access privileges.
Secure communications
Whether sharing classified state secrets or simply having a private conversation, end-to-end encryption is used for message authentication and to protect two-way communications like video conversations, instant messages and email. End-to-end encryption provides a high level of security and privacy for users and is widely used in communication apps like WhatsApp and Signal.
Types of cryptography
There are two main types of encryption in use today: symmetric cryptography and asymmetric cryptography. Both types use keys to encrypt and decrypt data sent and received. There are also hybrid cryptosystems that combine both.
A cryptosystem is considered symmetrical if each party—sender and receiver—uses the same key to encrypt and decrypt data. Algorithms such as the Advanced Encryption Standard (AES) and Data Encryption Standard(DES) are symmetric systems.
Asymmetric cryptography uses multiple keys—some shared and some private. In this way, the sender and receiver of an encrypted message have asymmetrical keys, and the system is asymmetrical. RSA—named after its progenitors Rivest, Shamir and Adleman—is one of the most common public key encryption algorithms.
While asymmetric systems are often considered to be more secure due to their use of private keys, the true measure of a system’s strength is more dependent on key length and complexity.
Symmetric cryptography
Symmetric key cryptography uses a shared single key for both encryption and decryption. In symmetric cryptography, both the sender and receiver of an encrypted message will have access to the same secret key.
Caesar’s cipher is an early example of a single key system. This primitive cipher worked by transposing each letter of a message forward by three letters, which would turn the word “cat” into “fdw” (although Caesar would have probably used the Latin word “cattus”). Since Caesar’s generals knew the key, they would be able to unscramble the message by simply reversing the transposition. In this way, symmetrical cryptosystems require that each party have access to the secret key prior to the encrypting, sending and decrypting of any information.
Some of the main attributes of symmetric encryption include the following:
Speed: The encryption process is comparatively fast.
Efficiency: Single key encryption is well suited for large amounts of data and requires fewer resources.
Confidential: Symmetrical encryption effectively secures data and prevents anyone without the key from decrypting the information.
Asymmetric cryptography
Asymmetric cryptography (also referred to as public key cryptography) uses one private key and one public key. Data that is encrypted with a public and private key requires both the public key and the recipient’s private key to be decrypted.
Public key cryptography enables secure key exchange over an insecure medium without the need to share a secret decryption key because the public key is only used in the encryption, but not the decryption process. In this way, asymmetric encryption adds an additional layer of security because an individual’s private key is never shared.
Some of the main attributes of symmetric encryption include the following:
Security: Asymmetric encryption is generally considered more secure.
Robust: Public key cryptography offers additional benefits, providing confidentially, authenticity and non-repudiation.
Resource intensive: Unlike single key encryption, asymmetrical encryption is slow and requires greater resources, which can be prohibitively expensive in some cases.
Cryptographic keys and key management
Cryptographic keys are essential for the secure use of encryption algorithms. Key management is a complex aspect of cryptography involving the generation, exchange, storage, use, destruction and replacement of keys. The Diffie-Hellman key exchange algorithm is a method used to securely exchange cryptographic keys over a public channel. Asymmetric key cryptography is a critical component in key exchange protocols.
Unlike Caesar’s cipher, which used a shifted Roman alphabet as a key, modern keys are far more complex and typically contain 128, 256 or 2,048 bits of information. Advanced cryptographic algorithms use these bits to rearrange and scramble the plaintext data into ciphertext. As the number of bits increases, the number of total possible arrangements of the data rises exponentially. Caesar’s cipher uses very few bits and would be very easy for a computer to decrypt (even without the secret key) by simple trying all the possible arrangements of the scrambled ciphertext until the entire message was transformed into readable plaintext. Hackers call this technic a brute force attack.
Adding more bits makes brute force attacks prohibitively difficult to compute. While a 56-bit system can be brute forced in 399 seconds by today’s most powerful computers, a 128-bit key would require 1.872 x 1037 years. A 256-bit system would take 3.31 x 1056 years. For reference, the entire universe is believed to have existed for only 13.7 billion years, which is less than a percent of a percent of the time it would take to brute force either a 128-bit or 256-bit cryptosystem.
Cryptographic algorithms and encryption methods
An encryption algorithm is a component of a cryptosystem that performs the transformation of data into ciphertext. Block ciphers like AES operate on fixed-size blocks of data, using a symmetric key for encryption and decryption. Stream ciphers, conversely, encrypt data one bit at a time.
Digital signatures and hash functions
Digital signatures and hash functions are used for authentication and ensuring data integrity. A digital signature created with cryptography provides a means of non-repudiation, ensuring that a message's sender cannot deny the authenticity of their signature on a document.
Hash functions, like the Secure Hash Algorithm 1 (SHA-1), can transform an input into a string of characters of a fixed-length, which is unique to the original data. This hash value helps in verifying the integrity of data by making it computationally infeasible to find two different inputs that could produce the same output hash.
The future of cryptography
In keeping pace with advancing technology and increasingly more sophisticated cyberattacks, the field of cryptography continues to evolve. Next-generation advanced protocols like quantum cryptography and elliptic curve cryptography (ECC) represent the cutting edge of cryptographic techniques.
Elliptical curve cryptography
Considered to be one of the main focal points of the next generation, elliptic curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can create faster, smaller and more efficient cryptographic keys.
Traditional asymmetric cryptosystems, while secure, are difficult to scale. They require a lot of resources and become very slow as they are applied to larger amounts of data. Furthermore, attempts to improve the security of public key cryptosystems to evade increasingly powerful attacks would require increasing the bit length of the public and private keys, which would significantly slow the encryption and decryption process.
First-generation public key cryptosystems are built on the mathematic functions of multiplication and factoring, in which public and private keys reveal the specific mathematical functions necessary to both encrypt plaintext and decrypt ciphertext. These keys are made by multiplying prime numbers. ECC uses elliptical curves—equations that can be represented as curved lines on a graph—to generate public and private keys based on different points on the line graph.
In a world where we are increasingly reliant on devices with less computing power, such as mobile phones, ECC provides an elegant solution based on the obscure mathematics of elliptical curves to generate smaller keys that are more difficult to crack.
The advantages of ECC over previous public key cryptosystems are undisputed, and it is already being used by the U.S. government, Bitcoin and Apple’s iMessage service. While first-generation systems like RSA are still effective for most settings, ECC is poised to become the new standard for privacy and security online—especially as the tremendous potential of quantum computing looms over the horizon. While quantum computers are still in their infancy and difficult to build, program and maintain, the potential increase in computation power would render all known public key encryption systems insecure, since a quantum machine could theoretically achieve a brute force attack significantly faster than classical computers.
Quantum cryptography
Quantum cryptography uses the principles of quantum mechanics to secure data in a way that is immune to many of the vulnerabilities of traditional cryptosystems. Unlike other types of encryption that rely on mathematic principles, quantum cryptography is based on physics to secure data in a way that is theoretically completely immune to hackers. Because it is impossible for a quantum state to be observed without it being changed, any attempts to covertly access quantum encoded data would be immediately identified.
Originally theorized in 1984, quantum encryption functions by using photon light particles sent across a fiberoptic cable to share a private key between the sender and receiver. This stream of photons travel in a single direction and each one represents a single bit of data, either 0 or 1. A polarized filter on the sender’s side changes the physical orientation of each photon to a specific position, and the receiver uses two available beam splitters to read the position of each photon. The sender and receiver compare the sent photon positions to the decoded positions, and the set that matches is the key.
Quantum cryptography provides many benefits over traditional cryptography because it does not rely on potentially solvable math equations to secure encrypted data. It also prevents eavesdropping since quantum data cannot be read without also being changed, and quantum cryptography can also integrate well with other types of encryption protocols. This type of cryptography enables users to digitally share a private encryption key that cannot be copied during transit. Once this key is shared, it can be used to encrypt and decrypt further messages in a way that has almost no risk of being compromised.
However, quantum cryptography also faces many challenges and limitations that have yet to be solved and currently prevent practical use of quantum cryptography. As quantum computing has yet to crossover from proofs of concept into practical application, quantum cryptography remains prone to error due to unintended changes in proton polarization. Quantum cryptography also requires specific infrastructure. Fiber optic lines are necessary for transferring protons and have a limited range of typically about 248 to 310 miles, which computer science researchers are working to extend. Additionally, quantum cryptography systems are limited by the number of destinations where they can send data. Since these types of systems rely on the specific orientation of unique photons, they are incapable of sending a signal to more than one intended recipient at any given time.
Related solutions
IBM cryptography solutions
When your organization’s sensitive data is accessed, stored and transmitted across hybrid and multicloud environments, it requires exceptional protection to keep it safe. IBM cryptography solutions combine technologies, consulting, systems integration and managed security services to help ensure crypto agility, quantum-safety and solid governance and risk policies.
Explore IBM cryptography solutions
IBM PCIe Cryptographic Coprocessor
IBM PCIe Cryptographic Coprocessors are a family of high-performance hardware security modules (HSM). These programmable PCIe cards work with certain IBM Z®, x64 and IBM Power® servers to offload computationally intensive cryptographic processes such as secure payments or transactions from the host server.
Explore IBM PCIe Cryptographic Coprocessor
IBM Quantum Safe technology
IBM Quantum Safe technology is a comprehensive set of tools, capabilities, and approaches for securing your enterprise for the quantum future. Use IBM Quantum Safe technology to replace at-risk cryptography and maintain ongoing visibility and control over your entire cybersecurity posture.
Explore IBM Quantum Safe technology
Resources
Related topic
What is encryption?
Data encryption is a way of translating data from plaintext (unencrypted) to ciphertext (encrypted). Users can access encrypted data with an encryption key and decrypted data with a decryption key.
Related topic
What is quantum-safe cryptography?
Quantum-safe cryptography secures sensitive data, access, and communications for the era of quantum computing.
Related topic
What is data security?
Data security is the practice of protecting digital information from unauthorized access, corruption or theft throughout its entire lifecycle. It’s a concept that encompasses every aspect of information security from the physical security of hardware and storage devices to administrative and access controls, as well as the logical security of software applications.
Podcast
The Quantum Quandary: How Researchers Are Bridging the Supercomputer Security Concerns
In this episode of Into the Breach, Dr. Walid Rjaibi shares his perspective on quantum safety and gives us an in-depth view of the security risk it poses, how researchers are addressing that risk, and how policy can (or should) shift to make standardization a reality.
Blog post
Protecting apps on IBM Cloud with quantum-safe cryptography
When large-scale quantum computers are available, they pose a potential risk that they will be able to break the systems that are built on public-key cryptography that are currently in use.
Related topic
What is end-to-end encryption?
End-to-end encryption (E2EE) is a secure communication process that prevents third parties from accessing data transferred from one endpoint to another.
Take the next step
IBM cryptography solutions can help your organization protect data and augment privacy and regulatory compliances. Schedule a free, one-on-one, 30-minute consultation to learn more about IBM cryptography solutions.
Book a meeting
Explore cryptography solutions
ISO - What is cryptography?
ISO - What is cryptography?
Skip to main content
Applications
OBP
English
españolfrançaisрусский
Menu
StandardsSectorsHealthIT & related technologiesTransportEnvironmental sustainabilityManagement & servicesSecurity, safety and risk Food and agricultureBuilding and constructionEnergyEngineeringMaterialsDiversity and inclusionAbout usNewsTaking partStore
Cart
Security
What is cryptography?
Tagged as Information technology
As a child, you may recall using symbols to write coded messages to your classmates that no one else could understand. More seriously, codes and ciphers are used for information security in computer systems and networks to protect sensitive and commercial information from unauthorized access when it is at rest or in transit. Uses include anything from keeping military secrets to transmitting financial data safely across the Internet.
Cryptography is an important computer security tool that deals with techniques to store and transmit information in ways that prevent unauthorized access or interference.
Table of contents
Enable Javascript to view table
How cryptography keeps communication secret and safe
The cryptographic process of scrambling text from a readable form to an unintelligible form – known as cipher text – is called encryption. Sending secret or private messages as cipher text is a typical use of cryptography. Once the cipher text is received, it is descrambled by the authorized recipient back to its readable form. The descrambling (or decryption) is performed with the use of an encryption key, which serves to prevent third parties from reading these messages.
Encryption methods have been used by many civilizations throughout history to prevent non-authorized people from understanding messages. Julius Caesar is credited for one of the earliest forms of cipher – the “Caesar Cipher” – to convey messages to his generals. With increasing sophistication, cryptography now plays a vital role in ensuring the privacy, data confidentiality, data integrity and authentication in computer systems and networks. In today’s world, where the majority of our personal and professional communications and transactions are conducted online, cryptography is more important than ever.
Sign up for email updates
Register for additional resources and updates on IT and related technologies!
Subscribe
Almost done!
You are only one step away from joining the ISO subscriber list. Please confirm your subscription by clicking on the email we've just sent to you. You will not be registered until you confirm your subscription. If you can't find the email, kindly check your spam folder and/or the promotions tab (if you use Gmail).
To learn how your data will be used, please see our privacy notice.Types of cryptography systems
Cryptography refers to the techniques and algorithms that are used today for secure communication and data in storage. It incorporates mathematics, computer science, electronics and digital signal processing. Broadly speaking, there are four types of cryptography systems:
Symmetric-key cryptography (or “secret key”): In this type of system, both the sender and the receiver share the same key, which is used to encrypt and decrypt the message.
Asymmetric-key cryptography (or “public key”): In this type of cryptography system, there are two keys – one public and one private; these form a pair and are related mathematically. To apply asymmetric cryptography, the sender uses the public key of the intended recipient to encode the message, and then sends it on its way. When the message arrives, only the recipient’s private key can be used to decode it, meaning that a stolen message is of no use to the thief without the corresponding private key. Encryption mechanisms are the focus of ISO/IEC 18033, a suite of International Standards that specifies a number of asymmetric ciphers. The multipart series includes identity-based ciphers, block ciphers, stream ciphers, and homomorphic encryption.
Cryptographic key management: This type of system is crucial for protecting the keys used in both symmetric and asymmetric cryptography. It includes a set of processes covering the entire “life cycle” of a key, including its generation, exchange and distribution, storage, use, safe destruction and replacement. If the key management is weak, then the protection of encrypted data is weak. There are a number of International Standards relating to key management (e.g. ISO/IEC 11770) and key generation (e.g. ISO/IEC 18031 and ISO/IEC 18032).
Cryptographic hash function: This is a technique that converts a string of data of any length into a hashed output (a digest of the input) of fixed length. Hash functions have many applications such as in digital signatures, MACs (message authentication codes), and checksums (to check data corruption). International Standards that specify hash functions include ISO/IEC 9797-2, ISO/IEC 9797-3 and ISO/IEC 10118.
Information security principles and uses of cryptography
The key principles of information security are confidentiality, integrity and availability. Cryptography is an important tool that helps to preserve two of these principles:
Data confidentiality ensures that data is not disclosed to unauthorized parties. Cryptographic techniques such as encryption can be used to protect the confidentiality of data by making it unreadable to those who don’t have the proper decryption key.
Data integrity ensures that data has not been modified or corrupted. One example for International Standards on data integrity is ISO/IEC 9797, which specifies algorithms for calculating message authentication codes.
In addition to these key information security objectives, cryptography is used to achieve:
Entity authentication
By checking knowledge of a secret, entity authentication verifies the identity of the sender. Various crypto-based mechanisms and protocols can be used to achieve this, such as symmetric systems, digital signatures, zero-knowledge techniques and checksums. ISO/IEC 9798 is a series of standards that specifies entity authentication protocols and techniques.
Digital signatures
Used to verify the authenticity of data, digital signatures confirm that the data originated from the signer and has not been changed. They are used, for example, in email messages, electronic documents and online payments. International Standards that specify digital signature schemes include ISO/IEC 9796, ISO/IEC 14888, ISO/IEC 18370 and ISO/IEC 20008.
Non-repudiation
Cryptographic techniques such as digital signatures can be used to provide non-repudiation by ensuring that the sender and receiver of a message cannot deny that they, respectively, sent or received the message. The standard ISO/IEC 13888 describes techniques (symmetric and asymmetric) for the provision of non-repudiation services.
Lightweight cryptography
Lightweight cryptography is used in applications and technologies that are constrained in computational complexity: limiting factors can be memory, power and computing resources. The need for lightweight cryptography is expanding in our modern digital world. Constrained devices – for example IoT (Internet of Things) sensors or actuators like the ones switching on appliances in a so-called smart home – use lightweight symmetric cryptography. ISO/IEC 29192 is an eight-part standard that specifies various cryptographic techniques for lightweight applications.
Digital rights management
Digital rights management (DRM) protects the copyright of your digital content. DRM uses cryptographic software to ensure that only authorized users can have access to the material, modify or distribute it.
Electronic commerce and online shopping
Secure e-commerce is made possible by the use of asymmetric-key encryption. Cryptography plays an important role in online shopping as it protects credit card information and related personal details, as well as customers’ purchasing history and transactions.
Cryptocurrencies and blockchain
A cryptocurrency is a digital currency that uses cryptographic techniques to secure transactions. Each cryptocurrency coin is validated via distributed ledger technologies (e.g. blockchain). A ledger, in this case, is a continuously growing list of records – known as blocks – that are linked together using cryptography. What are cryptographic algorithms?
A cryptographic algorithm is a math-based process for encoding text and making it unreadable. Cryptographic algorithms are used to provide data confidentiality, data integrity and authentication, as well as for digital signatures and other security purposes.
Both DES (Data Encryption Standard) and AES (Advanced Encryption Standard) are popular examples of symmetric-key algorithms, while prominent asymmetric-key algorithms include RSA (Rivest-Shamir-Adleman) and ECC (elliptic curve cryptography).
Elliptic curve cryptography (ECC)
ECC is an asymmetric-key technique based on the use of elliptic curves, which has applications in encryption and digital signatures, for example. ECC technology can be used to create faster, smaller and more efficient cryptographic keys. Elliptic curve techniques are covered in the multipart standard ISO/IEC 15946.
Standards for cryptography
Cryptography has been the subject of intense standardization efforts resulting in a range of International Standards that encapsulate the knowledge and best practice of leading experts in the field. Internationally agreed ways of working make technology more secure and interoperable. By using cryptography standards, developers can rely on common definitions, as well as proven methods and techniques. Future-proofing cryptography
Today, we are on the edge of a quantum revolution. The advent of quantum computing in the coming years will provide mankind with processing powers on a scale that traditional computers can never hope to match. While this offers countless possibilities for complex problem-solving, it also comes with corresponding security threats. That very same power could undermine much of today’s cybersecurity – including established cryptographic practices.
Quantum cryptography is a method of encryption that applies the principles of quantum mechanics to provide secure communication. It uses quantum entanglement to generate a secret key to encrypt a message in two separate places, making it (almost) impossible for an eavesdropper to intercept without altering its contents. Hailed as the next big revolution in secure communication systems, quantum cryptography has the potential to be a real breakthrough for data that needs to stay private far into the future.
The new dawn of encryption is looking bright!
News
What is cryptography?
Sitemap
StandardsBenefitsPopular standardsConformity assessmentSDGsSectorsHealthIT & related technologiesTransportEnvironmental sustainabilityManagement & servicesAbout usWhat we doStructureMembersStrategyNewsEventsMedia kitTaking partWho develops standardsDeliverablesGet involvedClimate action kitResourcesStoreStandards cataloguePublications and products
ISO name and logoPrivacy NoticeCopyrightCookie policyJobsFAQsContact ISO
Sign up for email updates
Subscribe
Almost done!
You are only one step away from joining the ISO subscriber list. Please confirm your subscription by clicking on the email we've just sent to you. You will not be registered until you confirm your subscription. If you can't find the email, kindly check your spam folder and/or the promotions tab (if you use Gmail).
To learn how your data will be used, please see our privacy notice.
Making lives easier, safer and better.
We are committed to ensuring that our website is accessible to everyone. If you have any questions or suggestions regarding the accessibility of this site, please contact us.
© All Rights Reserved All ISO publications and materials are protected by copyright and are subject to the user’s acceptance of ISO’s conditions of copyright. Any use, including reproduction requires our written permission. All copyright requests should be addressed to copyright@iso.org.
Powered by
What is Cryptography?
is Cryptography?Skip to main contentSolutions for:Home ProductsSmall Business 1-50 employeesMedium Business 51-999 employeesEnterprise 1000+ employeesSolutions for:Home ProductsSmall Business 1-50 employeesMedium Business 51-999 employeesEnterprise 1000+ employeesKaspersky logoMy KasperskyProductsProductsKasperskyPremium
Complete protection for your devices, online privacy & identityLearn moreFree, 30-day trialKasperskyPlus
Combines security, performance & privacy features in one appLearn moreFree, 30-day trialKasperskyStandard
Enhanced protection with device performance boosterLearn moreFree, 30-day trialKasperskySafe KidsFlexible parental controls & GPS tracker for your kidsLearn moreFree trialKasperskyVPN Secure ConnectionThe private and secure VPN to enjoy the Internet without compromising on speedLearn moreDownloadKasperskyPassword ManagerBank-grade security vault for your passwords & documentsLearn moreGet Free VersionOther LinksRenew LicenseSupportTrials & DownloadsRenewDownloadsSupportResource CenterBlogBlogBusinessNewsPrivacyProductsSpecial ProjectsTechnologyThreatsTipsHomeHome SecurityResource CenterDefinitionsWhat is Cryptography?
As the world becomes increasingly digital, the need for security has become ever more imperative. That’s where cryptography and its applications to cybersecurity come in.
Essentially, the word refers to the study of secure communications techniques, but cryptography is closely associated with encryption, or the act of scrambling ordinary text into what’s known as ciphertext—and then back again into ordinary text (called
plaintext) when it arrives at its destination. Several historical figures have been credited with creating and using cryptography through the centuries, from Greek historian Polybios and French diplomat Blaise de Vigenère to Roman Emperor Julius Caesar—who
is credited with using one of the first modern ciphers—and Arthur Scherbius, who created the Enigma code-breaking machine during World War Two. Likely, none of them would recognize the ciphers of the 21st century. But exactly what is cryptography?
And, how does it work?
Cryptography Definition
Cryptography is the technique of obfuscating or coding data, ensuring that only the person who is meant to see the information–and has the key to break the code–can read it. The word is a hybrid of two Greek words: “kryptós”, which means hidden, and “graphein”,
which means to write. Literally, the word cryptography translates to hidden writing, but in reality, the practice involves the secure transmission of information.
The use of cryptography can be traced to the ancient Egyptians and their creative use of hieroglyphics. But, the art of coding has seen great strides over the millennia, and modern cryptography combines advanced computer technology, engineering, and maths—among
other disciplines—to create highly sophisticated and secure algorithms and ciphers to protect sensitive data in the digital era.
For example, cryptography is used to create various types of encryption protocols that are regularly used to protect data. These include 128-bit or 256-bit encryption, Secure Sockets Layer (SSL), and Transport Layer Security (TLS). These encryption protocols
protect all manner of digital information and data, from passwords and emails to ecommerce and banking transactions.
There are different cryptographic types, which are useful for different purposes. For example, the simplest is symmetric key cryptography. Here, data is encrypted using a secret key, and then both the encoded message and the secret key are sent to the
recipient for decryption. Of course, the problem here is that if the message is intercepted, the third party can easily decode the message and steal the information.
To create a more secure system of encoding, cryptologists devised asymmetric cryptography, which is sometimes known as the “public key” system. In this instance, all users have two keys: one public and one private. When creating a coded message, the sender
will request the recipient’s public key to encode the message. This way, only the intended recipient’s private key will decode it. This way, even if the message is intercepted, a third party cannot decode it.
Why is cryptography important?
Cryptography is an essential cybersecurity tool. Its use means that data and users have an additional layer of security that ensures privacy and confidentiality and helps keep data from being stolen by cybercriminals. In practice, cryptography has many
applications:
Confidentiality: Only the intended recipient can access and read the information, so conversations and data remain private.
Integrity of data: Cryptography ensures that the encoded data cannot be modified or tampered with enroute from the sender to the receiver without leaving traceable marks— an example of this is digital signatures.
Authentication: Identities and destinations (or origins) are verified.
Non-repudiation: Senders become accountable for their messages since they cannot later deny that the message was transmitted—digital signatures and email tracking are examples of this.
What is cryptography in cybersecurity?
Interest in the use of cryptography grew with the development of computers and their connections over an open network. Over time, it became obvious that there was a need to protect information from being intercepted or manipulated while being transmitted
over this network. IBM was an early pioneer in this field, releasing its “Lucifer” encryption in the 1960s—this eventually became the first Data Encryption Standard (DES).
As our lives become increasingly digital, the need for cryptography to secure massive amounts of sensitive information has become even more imperative. Now, there are many ways in which cryptography is crucial in the online space. Encryption is an essential
part of being online, since so much sensitive data is transmitted everyday. Here are a few real-life applications:
Using virtual private networks (VPNs) or protocols such as SSL to browse the internet safely and securely.
Creating limited access controls so that only individuals with the correct permissions can carry out certain actions or functions, or access particular things.
Securing different types of online communication, including emails, login credentials, and even text messages—such as with WhatsApp or Signal—through end-to-end encryption.
Protecting users from various types of cyberattacks, such as man-in-the-middle attacks.
Allowing companies to meet legal requirements, such as the data protections set out in the General Data Protection Regulation (GDPR).
Creating and verifying login credentials, especially passwords.
Allowing the secure management and transaction of cryptocurrencies.
Enabling digital signatures to securely sign online documents and contracts.
Verifying identities when logging into online accounts.
What are the types of cryptography?
Cryptography definitions are, understandably, quite broad. This is because the term covers a wide range of different processes. As such, there are many different types of cryptographic algorithms, each one offering varying levels of security, depending
on the type of information being transmitted. Below are the three main cryptographic types:
Symmetric Key Cryptography: This simpler form of cryptography takes its name from the fact that both the sender and receiver share one key to encrypt and decrypt information. Some examples of this are the Data Encryption Standard (DES) and Advanced
Encryption Standard (AES). The main difficulty here is finding a way to securely share the key between the sender and receiver.
Asymmetric Key Cryptography: A more secure type of cryptography, this involves both the sender and receiver having two keys: one public and one private. During the process, the sender will use the receiver’s public key to encrypt the message, while
the receiver will use their private key to decrypt it. The two keys are different, and since only the receiver will have the private key, they will be the only ones able to read the information. The RSA algorithm is the most popular form of asymmetric
cryptography.
Hash Functions: These are types of cryptographic algorithms that do not involve the use of keys. Instead, a hash value—a number of fixed lengths that acts as a unique data identifier—is created based on the length of the plain text information and
used to encrypt the data. This is commonly used by various operating systems to protect passwords, for example.
From the above, it is clear that the main difference in symmetric and asymmetric encryption in cryptography is that the first only involves one key while the second requires two.
Types of symmetric cryptography
Symmetric encryption is sometimes called secret key cryptography because one single—purportedly—secret key is used to encrypt and decrypt information. There are several forms of this type of cryptography, including:
Stream ciphers: These work on a single byte of data at a time and regularly change the encryption key. In this process, the keystream can be in tandem with—or independent of the message stream. This is called self-synchronizing or synchronous, respectively.
Block ciphers: This type of cryptography—which includes the Feistel cipher—codes and decodes one block of data at a time.
Forms of asymmetric key cryptography
Asymmetric cryptography—sometimes referred to as public-key encryption—hinges on the fact that the receiver has two keys in play: a public one and a private one. The first is used by the sender to encode the information, while the receiver uses the latter—which
only they have—to securely decrypt the message.
Asymmetric key cryptography encrypts and decrypts messages using algorithms. These are based on various mathematical principles, such as multiplication or factorization—multiplying two big prime numbers to generate one massive, random number which is
incredibly tricky to crack—or exponentiation and logarithms, which create exceptionally complex numbers that are nearly impossible to decrypt, such as in 256-bit encryption. There are different types of asymmetric key algorithms, such as:
RSA: The first type of asymmetric cryptography to be created, RSA is the basis of digital signatures and key exchanges, among other things. The algorithm is based on the principle of factorization.
Elliptic Curve Cryptography (ECC): Often found in smartphones and on cryptocurrency exchanges, ECC employs the algebraic structure of elliptic curves to build complex algorithms. Significantly, it does not require much storage memory or usage bandwidth,
making it especially useful for electronic devices with limited computing power.
Digital Signature Algorithm (DSA): Built on the principles of modular exponentiations, DSA is the gold standard for verifying electronic signatures and was created by the National Institute of Standards and Technologies.
Identity-based Encryption (IBE): This unique algorithm negates the need for a message recipient to provide their public key to the sender. Instead, a known unique identifier—such as an email address—is used by the sender to generate a public key to
encode the message. A trusted third-party server then generates a corresponding private key that the receiver can access to decrypt the information.
Cryptographic attacks
As with most technologies, cryptography has become increasingly sophisticated. But that does not mean that these encryptions cannot be broken. If the keys are compromised, it is possible for an external party to crack the coding and read the protected
data. Here are a few potential issues to watch for:
Weak keys: Keys are a collection of random numbers used with an encryption algorithm to alter and disguise data so that it is incomprehensible to others. Longer keys involve more numbers, making them much trickier to crack—and therefore, better for
protecting data.
Using keys incorrectly: Keys need to be used correctly—if they are not, hackers can easily crack them to access the data they are supposed to protect.
Reusing keys for different purposes: Like passwords, each key should be unique—using the same key across different systems weakens the ability of cryptography to protect data.
Not changing keys: Cryptographic keys can quickly become out of date, which is why it is important to regularly update them to keep data secure.
Not storing keys carefully: Ensure that keys are kept in a secure place where they cannot easily be found, otherwise they can be stolen to compromise the data they protect.
Insider attacks: Keys can be compromised by individuals who legitimately have access to them—such as an employee— and who them sells them on for nefarious purposes.
Forgetting the backup: Keys should have a backup because if they suddenly become faulty, the data they protect could become inaccessible.
Recording keys incorrectly: Manually entering keys into a spreadsheet or writing them down on paper may appear to be a logical choice, but it is also one that is prone to error and theft.
There are also specific cryptography attacks designed to break through encryptions by finding the right key. Here are some of the common:
Brute force attacks: Broad attacks that try to randomly guess private keys using the known algorithm.
Ciphertext-only attacks: These attacks involve a third party intercepting the encrypted message—not the plaintext—and trying to work out the key to decrypt the information, and later, the plaintext.
Chosen ciphertext attack: The opposite of a chosen plaintext attack, here, the attacker analyses a section of ciphertext against its corresponding plaintext to discover the key.
Chosen plaintext attack: Here, the third party chooses the plaintext for a corresponding ciphertext to begin working out the encryption key.
Known plaintext attack: In this case, the attacker randomly accesses part of the plaintext and part of the ciphertext and begins to figure out the encryption key. This is less useful for modern cryptography as it works best with simple ciphers.
Algorithm attack: In these attacks, the cybercriminal analyses the algorithm to try and work out the encryption key.
Is it possible to mitigate the threat of cryptography attacks?
There are a few ways in which individuals and organizations can try and lower the possibility of a cryptographic attack. Essentially, this involves ensuring the proper management of keys so that they are less likely to be intercepted by a third party,
or useable even if they do. Here are a few suggestions:
Use one key for each specific purpose—for example, use unique keys for authentication and digital signatures .
Protect cryptographic keys with stronger Key-encryption-keys (KEKs).
Use hardware security modules to manage and protect keys—these function like regular password managers.
Ensure that keys and algorithms are regularly updated.
Encrypt all sensitive data.
Create strong, unique keys for each encryption purpose.
Store keys securely so they cannot be easily accessed by third parties.
Ensure the correct implementation of the cryptographic system.
Include cryptography in security awareness training for employees.
The need for cryptography
Most people will not need to have more than a basic understanding of what cryptography is. But learning the cryptography definition, how the process works, and its applications to cybersecurity, can be useful in being more mindful about managing day-to-day
digital interactions. This can help most people keep their emails, passwords, online purchases, and online banking transactions—all of which use cryptography in their security features—more secure.
Get Kaspersky Premium + 1 YEAR FREE Kaspersky Safe Kids. Kaspersky Premium received five AV-TEST awards for best protection, best performance, fastest VPN, approved parental control for Windows and best rating for parental control Android.
Related Articles and Links:
Understanding endpoint detection and response
What is steganography?
What is cybersecurity?
Related Products and Services:
Kaspersky Standard
Kaspersky Premium
Kaspersky Endpoint Security Cloud
Kaspersky VPN Secure ConnectionWhat is Cryptography?KasperskyCryptography is a key part of cybersecurity. Learn how it works, why it’s important, and its different forms. Read more in the Kaspersky blog here.Featured ArticlesCrypto Wallet Hardware: Hardware Wallet vs Cold WalletsWhat is security awareness training?What is ransomware as a service?Tor Browser: What is it and is it safe?What is a Dictionary Attack?Stay in Touch
Home Solutions
Kaspersky Standard
Kaspersky Plus
Kaspersky Premium
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
All Solutions
Small Business Products
(1-50 employees)
Kaspersky Small Office Security
Kaspersky Endpoint Security Cloud
All Products
Medium Business Products
(51-999 employees)
Kaspersky Endpoint Security Cloud
Kaspersky Endpoint Security for Business Select
Kaspersky Endpoint Security for Business Advanced
All Products
Enterprise Solutions
(1000+ employees)
Cybersecurity Services
Threat Management and Defense
Endpoint Security
Hybrid Cloud Security
All Solutions
© 2024 AO Kaspersky LabPrivacy Policy • Online Tracking Opt-Out Guide • Anti-Corruption Policy • License Agreement B2C • License Agreement B2BContact UsAbout UsPartnersBlogResource CenterPress ReleasesSitemapCareersSelect your countryGlobal
Americas
América Latina
Brasil
United States
Canada
Africa
Afrique Francophone
Algérie
Maroc
South Africa
Tunisie
Middle East
Middle East
الشرق الأوسط
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland & België
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.Accept and Cl
What Is Cryptography and How Does It Work? | Synopsys
What Is Cryptography and How Does It Work? | Synopsys
Application Security
Application Security
| Build trust in your software
Support
About Us
English
日本語
简体中文
close search bar
Sorry, not available in this language yet
close language selection
English
日本語
简体中文
Platform
Solutions
Tools & Services
Customer Success
Partners
Resources
Blog
Contact Sales
Tools & Services
go back
Go Back
Integrated AppSec Solutions
AppSec SaaS Platform
AppSec IDE Plug-ins
Application Security Posture Management
DevSecOps Integrations
Software Risk Analysis
Static Analysis (SAST)
Software Composition Analysis (SCA)
Interactive Analysis (IAST)
Dynamic Analysis (DAST)
Penetration Testing
Protocol Fuzzing
AppSec Program Services
Program Strategy & Planning
Threat & Risk Assessments
Security Training
Implementation & Deployment
Security Testing Services
M&A Due Diligence
Open Source & Security Audits
2023 Gartner® Magic Quadrant™ for AppSec Testing
See why Synopsys is a Leader
AppSec SaaS Platform | Integrated, cloud-based AST solution optimized for development and DevSecOps teams.
AppSec IDE Plug-ins | Secure code as you write it in your IDE
Software Risk Management | Manage application security programs at enterprise scale
DevSecOps Integrations | Integrate AppSec tools into DevOps workflows
Static Analysis (SAST) | Address security and quality defects in code as it's being developed
Software Composition Analysis (SCA) | Secure and manage open source risks in applications and containers
Interactive Analysis (IAST) | Automate web security testing within your DevOps pipelines
Dynamic Analysis (DAST) | Continuous web application security testing in production.
Penetration Testing | Identify business-critical vulnerabilities with on-demand testing expertise.
Protocol Fuzzing | Identify defects and zero-day vulnerabilities in services and protocols
Program Strategy & Planning | Measure, scale, and optimize your AppSec program
Threat & Risk Assessments | Understand and address internal and external security risks
Security Training | Equip development teams with the skills they need to produce more secure software
Implementation & Deployment | Optimize utilization, management and deployment of AppSec tools
Security Testing Services | On-demand AppSec testing resources and expertise
Open Source & Security Audits | Comprehensive technical due diligence services for M&A
close sub navigation
Application Security index
Solutions
go back
Go Back
Use Cases
API Security Testing
AppSec Consolidation
Application Security Testing
DevSecOps
Software Supply Chain Security
Manage AppSec Risk
Cloud & Container Security
Open Source License Compliance
M&A Due Diligence
Quality & Security Standards Compliance
By Role
Dev and DevOps Teams
Security Teams
Legal Teams
By Industry
Financial Services
IoT & Embedded
Automotive
Telecommunications
Aerospace & Defense
Public Sector
Medical Device
2023 Gartner® Magic Quadrant™ for AppSec Testing
See why Synopsys is a Leader
API Security Testing | Manage software risks with a holistic API security testing program.
AppSec Consolidation | Simplify your application security program
Application Security Testing | Solutions to address security risks at all stages of the application life cycle.
DevSecOps | Solutions to help shift security left without slowing down your development teams.
Software Supply Chain Security | Solutions to identify and manage software supply chain risks end-to-end.
Manage AppSec Risk | Scale your application security program without increasing complexity or adding friction.
Cloud & Container Security | Optimize your applications for secure deployment and operation in the cloud
Open Source License Compliance | Effective solutions for ensuring open source license compliance
M&A Due Diligence | Identify software risks that could negatively impact the value of acquired IP.
Quality & Security Standards Compliance | Ensure your software complies with the standards critical to customers and regulators
Dev and DevOps Teams | Build secure software while maintaining developer productivity and pipeline velocity.
Security Teams | Align people, processes, and technology to minimize software risk and transform your business.
Legal Teams | Solutions to protect your IP and manage risk.
Financial Services | Protect sensitive customer and financial data from rapidly evolving security threats.
IoT & Embedded | Ensure your embedded and IoT devices are safe, secure, and reliable.
Automotive | Build software security & reliability into the modern connected car.
Telecommunications | Create seamless and safe mobile experiences, from silicon to software.
Aerospace & Defense | Solutions for automating mission-critical development.
Public Sector | Application security for government agencies and their suppliers.
Medical Device | Safeguard medical devices and applications.
close sub navigation
Application Security index
Customer Success
go back
Go Back
Customer Success
Our Commitment
Meet Your Team
Customer Testimonials
Support
Submit a Ticket
Documentation
Customer Community
Product Education
Add-On Services
Premium & Designated Support
Implementation & Deployment
AppSec Training
2023 Gartner® Magic Quadrant™ for AppSec Testing
See why Synopsys is a Leader
Our Commitment | Gain the confidence to implement, deploy, and grow with your AppSec tools
Meet Your Team | Achieve your AppSec goals with support from Synopsys experts.
Customer Testimonials | Application security customer success stories
Submit a Ticket | Visit our customer community for online support.
Documentation | Comprehensive user guides and how-to articles. <./li>
Customer Community | Search for answers, knowledge articles, tutorials, documentation, and more.
Product Education | Interactive courseware designed to help implement best practices for secure code.
Premium & Designated Support | Support with expedited response times and access to specialized technical, tactical, and operational knowledge.
Implementation & Deployment | Discover how to best utilize, manage, and deploy your application testing tools.
AppSec Training | Equip development teams with the skills they need to produce more secure software.
close sub navigation
Application Security index
Resources
go back
Go Back
Application Security News
Manage Security Risks
Build Security into DevOps
Secure the Software Supply Chain
Security News & Trends
Content Library
Case Studies
eBooks
Glossary
Reports
Webinars
White Papers
Cybersecurity Research Center
Overview
Research
News Room
Press Releases
2023 Gartner® Magic Quadrant™ for AppSec Testing
See why Synopsys is a Leader
Manage Security Risks News | Read the latest information on how to manage application security risks.
Build Security into DevOps News | Get insights from Synopsys on building security into DevOps.
Secure the Software Supply Chain News | Discover software supply chain risk management tips and best practices.
Security News & Trends | Get an analysis of today’s application security news and trends.
Case Studies | Application security customer stories
eBooks | Browse the latest ebooks on software security trends and best practices
Glossary | Glossary of Application Security, EDA & Semiconductor IP terms
Reports | Browse the latest application security reports from Synopsys and industry-leading analysts.
Webinars | Browse the latest webinars on application security solutions, trends, and strategies.
White Papers | Access the latest white papers for technical knowledge on application security solutions.
Overview | Learn more about the Synopsys Cybersecurity Research Center.
Research | Access the latest first-party research and analysis from the Synopsys Cybersecurity Research Center.
Press Releases | Browse our most recent news releases.
close sub navigation
Application Security index
|
✕
Home
Products A-Z
Silicon Design
Design
Verification Family
Synopsys IP
Application Security
Manufacturing Solutions
Simpleware 3D Image Processing
Optical Solutions
Photonic Solutions
Solutions
Aerospace & Government
AI & Machine Learning Solutions
Internet of Things
HPC & Data Center
Cloud
5G
Memory
Multi-Die System Solution
RF Design
RISC-V
About Us
Newsroom
Community
Services
Support
Blogs
Careers
Events
Academic & Research Alliances
Webinars
Partners
Glossary
What is Design Planning?
What is cryptography?
The 10 most common web and software application vulnerabilities
Table of Contents
What is the difference between symmetric and asymmetric cryptography?
What problems does cryptography solve?
What are the principles?
What to read next
Definition
Cryptography provides for secure communication in the presence of malicious third-parties—known as adversaries. Encryption uses an algorithm and a key to transform an input (i.e., plaintext) into an encrypted output (i.e., ciphertext). A given algorithm will always transform the same plaintext into the same ciphertext if the same key is used. Algorithms are considered secure if an attacker cannot determine any properties of the plaintext or key, given the ciphertext. An attacker should not be able to determine anything about a key given a large number of plaintext/ciphertext combinations which used the key.
What is the difference between symmetric and asymmetric cryptography?
With symmetric cryptography, the same key is used for both encryption and decryption. A sender and a recipient must already have a shared key that is known to both. Key distribution is a tricky problem and was the impetus for developing asymmetric cryptography.
With asymmetric crypto, two different keys are used for encryption and decryption. Every user in an asymmetric cryptosystem has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.
Data encrypted with a public key may only be decrypted with the corresponding private key. So, sending a message to John requires encrypting that message with John’s public key. Only John can decrypt the message, as only John has his private key. Any data encrypted with a private key can only be decrypted with the corresponding public key. Similarly, Jane could digitally sign a message with her private key, and anyone with Jane’s public key could decrypt the signed message and verify that it was in fact Jane who sent it.
Symmetric is generally very fast and ideal for encrypting large amounts of data (e.g., an entire disk partition or database). Asymmetric is much slower and can only encrypt pieces of data that are smaller than the key size (typically 2048 bits or smaller). Thus, asymmetric crypto is generally used to encrypt symmetric encryption keys which are then used to encrypt much larger blocks of data. For digital signatures, asymmetric crypto is generally used to encrypt the hashes of messages rather than entire messages.
A cryptosystem provides for managing cryptographic keys including generation, exchange, storage, use, revocation, and replacement of the keys.
Identify and address weaknesses in your software design and deployment
Understand the internal and external security risks your AppSec program needs to address.
Learn more
What problems does cryptography solve?
A secure system should provide several assurances such as confidentiality, integrity, and availability of data as well as authenticity and non-repudiation. When used correctly, crypto helps to provide these assurances. Cryptography can ensure the confidentiality and integrity of both data in transit as well as data at rest. It can also authenticate senders and recipients to one another and protect against repudiation.
Software systems often have multiple endpoints, typically multiple clients, and one or more back-end servers. These client/server communications take place over networks that cannot be trusted. Communication occurs over open, public networks such as the Internet, or private networks which may be compromised by external attackers or malicious insiders.
It can protect communications that traverse untrusted networks. There are two main types of attacks that an adversary may attempt to carry out on a network. Passive attacks involve an attacker simply listening on a network segment and attempting to read sensitive information as it travels. Passive attacks may be online (in which an attacker reads traffic in real-time) or offline (in which an attacker simply captures traffic in real-time and views it later—perhaps after spending some time decrypting it). Active attacks involve an attacker impersonating a client or server, intercepting communications in transit, and viewing and/or modifying the contents before passing them on to their intended destination (or dropping them entirely).
The confidentiality and integrity protections offered by cryptographic protocols such as SSL/TLS can protect communications from malicious eavesdropping and tampering. Authenticity protections provide assurance that users are actually communicating with the systems as intended. For example, are you sending your online banking password to your bank or someone else?
It can also be used to protect data at rest. Data on a removable disk or in a database can be encrypted to prevent disclosure of sensitive data should the physical media be lost or stolen. In addition, it can also provide integrity protection of data at rest to detect malicious tampering.
What are the principles?
The most important principle to keep in mind is that you should never attempt to design your own cryptosystem. The world’s most brilliant cryptographers (including Phil Zimmerman and Ron Rivest) routinely create cryptosystems with serious security flaws in them. In order for a cryptosystem to be deemed “secure,” it must face intense scrutiny from the security community. Never rely on security through obscurity, or the fact that attackers may not have knowledge of your system. Remember that malicious insiders and determined attackers will attempt to attack your system.
The only things that should be “secret” when it comes to a secure cryptosystem are the keys themselves. Be sure to take appropriate steps to protect any keys that your systems use. Never store encryption keys in clear text along with the data that they protect. This is akin to locking your front door and placing the key under the doormat. It is the first place an attacker will look. Here are three common methods for protecting keys (from least secure to most secure):
Store keys in a filesystem and protect them with strong access control lists (ACLs). Remember to adhere to the principal of least privilege.
Encrypt your data encryption keys (DEKs) with a second key encrypting key (KEK). The KEK should be generated using password-based encryption (PBE). A password known to a minimal number of administrators can be used to generate a key using an algorithm such as bcrypt, scrypt, or PBKDF2 and used to bootstrap the cryptosystem. This removes the need to ever store the key unencrypted anywhere.
A hardware security module (HSM) is a tamper-resistant hardware appliance that can be used to store keys securely. Code can make API calls to an HSM to provide keys when needed or to perform decryption of data on the HSM itself.
Make sure that you only use algorithms, key strengths, and modes of operation that conform to industry best practices. Advanced encryption standard (AES) (with 128, 192, or 256-bit keys) is the standard for symmetric encryption. RSA and elliptical curve cryptography (ECC) with at least 2048-bit keys are the standard for asymmetric encryption. Be sure to avoid insecure modes of operation such as AES in Electronic Codebook (ECB) mode or RSA with no padding.
Resources to manage your AppSec risk at enterprise scale
Software Vulnerability Snapshot
Learn about the 10 most common web and software app vulnerabilities
Download the report
Manage your AppSec Risk
Get actionable insight to manage your software risk
Download the eBook
BSIMM14
Read the analysis of the top software security initiatives
Download the report
Consolidate and Simplify AppSec to Manage your Software Risk
Learn how to optimize your AppSec strategy
Download the eBook
Questions about application security?
Contact us
Footer
Corporate
About Us
Careers
ESG
Inclusion & Diversity
Investor Relations
View our Office Locations
Contact Us
Products
Application Security
Semiconductor IP
Verification
Design
Silicon Engineering
Resources
Solutions
Services
Support
Community
Academic & Research Alliances (SARA)
Manage Subscriptions
Learn
Blogs
Press Releases
Newsroom
What is EDA?
What is Application Security?
Legal
Privacy
Trademarks & Brands
Software Integrity Agreements
Security
Follow
Follow
©2024 Synopsys, Inc. All Rights Reserved
Cryptography | NIST
Cryptography | NIST
Skip to main content
An official website of the United States government
Here’s how you know
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
Lock
A locked padlock
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
https://www.nist.gov/cryptography
Search NIST
Menu
Close
Topics
All Topics
Advanced communications
Artificial intelligence
Bioscience
Buildings and construction
Chemistry
Climate
Cybersecurity
Electronics
Energy
Environment
Fire
Forensic science
Health
Information technology
Infrastructure
Manufacturing
Materials
Mathematics and statistics
Metrology
Nanotechnology
Neutron research
Performance excellence
Physics
Public safety
Resilience
Standards
Transportation
Publications
Labs & Major Programs
Laboratories
Communications Technology Laboratory
Engineering Laboratory
Information Technology Laboratory
Material Measurement Laboratory
Physical Measurement Laboratory
User Facilities
NIST Center for Neutron Research
CNST NanoFab
Research Test Beds
Research Projects
Tools & Instruments
Major Programs
Baldrige Performance Excellence Program
CHIPS for America Initiative
Manufacturing Extension Partnership (MEP)
Office of Advanced Manufacturing
Special Programs Office
Technology Partnerships Office
Services & Resources
Standards and Measurements
Calibration Services
Laboratory Accreditation (NVLAP)
Quality System
Standard Reference Materials (SRMs)
Standards.gov
Time Services
Office of Weights and Measures
Software
Data
Chemistry WebBook
National Vulnerability Database
Physical Reference Data
Standard Reference Data (SRD)
Storefront
License & Patents
Computer Security Resource Center (CSRC)
NIST Research Library
News & Events
News
Events
Blogs
Feature Stories
Awards
Video Gallery
Image Gallery
Media Contacts
About NIST
About Us
Leadership
Organization Structure
Budget & Planning
Contact Us
Visit
Careers
Student programs
Work with NIST
History
NIST Digital Archives
NIST Museum
NIST and the Nobel
Educational Resources
Information Technology /Cybersecurity
Cryptography
Overview
Cryptography uses mathematical techniques to transform data and prevent it from being read or tampered with by unauthorized parties. That enables exchanging secure messages even in the presence of adversaries. Cryptography is a continually evolving field that drives research and innovation. The Data Encryption Standard (DES), published by NIST in 1977 as a Federal Information Processing Standard (FIPS), was groundbreaking for its time but would fall far short of the levels of protection needed today.
As our electronic networks grow increasingly open and interconnected, it is crucial to have strong, trusted cryptographic standards and guidelines, algorithms and encryption methods that provide a foundation for e-commerce transactions, mobile device conversations and other exchanges of data. NIST has fostered the development of cryptographic techniques and technology for 50 years through an open process which brings together industry, government, and academia to develop workable approaches to cryptographic protection that enable practical security.
Our work in cryptography has continually evolved to meet the needs of the changing IT landscape. Today, NIST cryptographic solutions are used in commercial applications from tablets and cellphones to ATMs, to secure global eCommcerce, to protect US federal information and even in securing top-secret federal data. NIST looks to the future to make sure we have the right cryptographic tools ready as new technologies are brought from research into operation. For example, NIST is now working on a process to develop new kinds of cryptography to protect our data when quantum computing becomes a reality. At the other end of the spectrum, we are advancing so-called lightweight cryptography to balance security needs for circuits smaller than were dreamed of just a few years ago.
In addition to standardizing and testing cryptographic algorithms used to create virtual locks and keys, NIST also assists in their use. NIST’s validation of strong algorithms and implementations builds confidence in cryptography—increasing its use to protect the privacy and well-being of individuals and businesses.
NIST continues to lead public collaborations for developing modern cryptography, including:
Block ciphers, which encrypt data in block-sized chunks (rather than one bit at a time) and are useful in encrypting large amounts of data.
Cryptographic hash algorithms, which create short digests, or hashes, of the information being protected. These digests find use in many security applications including digital signatures (the development of which NIST also leads).
Key establishment, employed in public-key cryptography to establish the data protection keys used by the communicating parties.
Post-quantum cryptography, intended to be secure against both quantum and classical computers and deployable without drastic changes to existing communication protocols and networks.
Lightweight cryptography, which could be used in small devices such as Internet of Things (IoT) devices and other resource-limited platforms that would be overtaxed by current cryptographic algorithms.
Privacy-enhancing cryptography, intended to allow research on private data without revealing aspects of the data that could be used to identify its owner.
Digital Signatures, which is an electronic analogue of a written signature that provides assurance that the claimed signatory signed, and the information was not modified after signature generation.
Random Bit Generation, which is a device or algorithm that can produce a sequence of bits that appear to be both statistically independent and unbiased.
NIST also promotes the use of validated cryptographic modules and provides Federal agencies with a security metric to use in procuring equipment containing validated cryptographic modules through other efforts including: FIPS 140, Cryptographic Programs and Laboratory Accreditation Cryptographic Module Validation Program (CMVP), Cryptographic Algorithm Validation Program (CAVP), and Applied Cryptography at NIST's National Cybersecurity Center of Excellence (NCCoE).
Featured Content
NIST Role and Activities Relative to the Post Quantum Cryptography White House …
Cryptography Resources
Migration to Post-Quantum Cryptography
Applied Cryptography
Post Quantum Encryption
Post-Quantum Cryptography: the Good, the Bad, and the Powerful
In an animated story featuring NIST’s Matthew Scholl, this video emphasizes how NIST is working with the brightest minds in government, academia, and industry from around the world to develop a new set of encryption standards that will work with our current classical computers—while being resistant to the quantum machines of the future. Quantum computers will be incredibly powerful and will have the potential to provide tremendous societal benefits; however, there are concerns related to how quantum computers could be used by our adversaries, competitors, or criminals. This video explores these scenarios and explains how we are staying ahead of this potential cybersecurity threat.
To learn more about NIST’s cryptography work, please visit our main cryptography page: https://www.nist.gov/cryptography.
To learn about a specific project, Crypto Agility: Considerations for Migrating to Post-Quantum Cryptographic Algorithms, please visit this page: https://www.nccoe.nist.gov/projects/building-blocks/post-quantum-cryptography.
News
Post-Quantum Cryptography: A Q&A With NIST’s Matt Scholl
Quantum computing algorithms seek to use quantum phenomena to perform certain types of calculations much more efficiently than today’s classical, binary, transistor-based computers can. If and when a powerful enough quantum computer is built, it could run algorithms that would break many of the encryption codes we use to protect our data. In this interview with Taking Measure, Matt Scholl, chief
Read more
NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers
Read more
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
Read more
NIST Retires SHA-1 Cryptographic Algorithm
Read more
View All News and Updates
HEADQUARTERS
100 Bureau Drive
Gaithersburg, MD 20899
301-975-2000
Webmaster | Contact Us | Our Other Offices
YouTube
Giphy
RSS Feed
Mailing List
How are we doing? Feedback
Site Privacy
Accessibility
Privacy Program
Copyrights
Vulnerability Disclosure
No Fear Act Policy
FOIA
Environmental Policy
Scientific Integrity
Information Quality Standards
Commerce.gov
Science.gov
USA.gov
Vote.gov
What is Cryptography? Definition from SearchSecurity
What is Cryptography? Definition from SearchSecurity
Security
Search the TechTarget Network
Login
Register
Explore the Network
TechTarget Network
Networking
CIO
Enterprise Desktop
Cloud Computing
Computer Weekly
Security
Analytics & Automation
Application & Platform Security
Cloud Security
Compliance
Data Security & Privacy
More Topics
IAM
Network Security
Operations & Management
Risk Management
Security Careers & Certifications
Threat Detection & Response
Threats & Vulnerabilities
Other Content
News
Features
Tips
Webinars
2023 IT Salary Survey Results
More
Answers
Conference Guides
Definitions
Opinions
Podcasts
Quizzes
Tech Accelerators
Tutorials
Videos
Sponsored Communities
Follow:
Home
Identity and access management
Definition
cryptography
Share this item with your network:
By
Kathleen Richards
What is cryptography?
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.
In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email.
Cryptography techniques
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes techniques such as microdots, merging words with images and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers.
Modern cryptography concerns itself with the following four objectives:
Confidentiality. The information cannot be understood by anyone for whom it was unintended.
Integrity.The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.
Non-repudiation. The creator/sender of the information cannot deny at a later stage their intentions in the creation or transmission of the information.
Authentication. The sender and receiver can confirm each other's identity and the origin/destination of the information.
Procedures and protocols that meet some or all of the above criteria are known as cryptosystems. Cryptosystems are often thought to refer only to mathematical procedures and computer programs; however, they also include the regulation of human behavior, such as choosing hard-to-guess passwords, logging off unused systems and not discussing sensitive procedures with outsiders.
Cryptography is the process of encrypting and decrypting data.
Cryptographic algorithms
Cryptosystems use a set of procedures known as cryptographic algorithms, or ciphers, to encrypt and decrypt messages to secure communications among computer systems, devices and applications.
A cipher suite uses one algorithm for encryption, another algorithm for message authentication and another for key exchange. This process, embedded in protocols and written in software that runs on operating systems (OSes) and networked computer systems, involves:
public and private key generation for data encryption/decryption
digital signing and verification for message authentication
key exchange
Types of cryptography
Single-key or symmetric-key encryption algorithms create a fixed length of bits known as a block cipher with a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decipher it. One example of symmetric-key cryptography is the Advanced Encryption Standard (AES). AES is a specification established in November 2001 by the National Institute of Standards and Technology (NIST) as a Federal Information Processing Standard (FIPS 197) to protect sensitive information. The standard is mandated by the U.S. government and widely used in the private sector.
In June 2003, AES was approved by the U.S. government for classified information. It is a royalty-free specification implemented in software and hardware worldwide. AES is the successor to the Data Encryption Standard (DES) and DES3. It uses longer key lengths -- 128-bit, 192-bit, 256-bit -- to prevent brute force and other attacks.
Symmetric cryptography uses a single key while asymmetric cryptography uses a key pair to encrypt and decrypt data.
Public-key or asymmetric-key encryption algorithms use a pair of keys, a public key associated with the creator/sender for encrypting messages and a private key that only the originator knows (unless it is exposed or they decide to share it) for decrypting that information.
Examples of public-key cryptography include:
RSA, used widely on the internet
Elliptic Curve Digital Signature Algorithm (ECDSA) used by Bitcoin
Digital Signature Algorithm (DSA) adopted as a Federal Information Processing Standard for digital signatures by NIST in FIPS 186-4
Diffie-Hellman key exchange
To maintain data integrity in cryptography, hash functions, which return a deterministic output from an input value, are used to map data to a fixed data size. Types of cryptographic hash functions include SHA-1 (Secure Hash Algorithm 1), SHA-2 and SHA-3.
Cryptography concerns
Attackers can bypass cryptography, hack into computers that are responsible for data encryption and decryption, and exploit weak implementations, such as the use of default keys. However, cryptography makes it harder for attackers to access messages and data protected by encryption algorithms.
Growing concerns about the processing power of quantum computing to break current cryptography encryption standards led NIST to put out a call for papers among the mathematical and science community in 2016 for new public key cryptography standards.
Unlike today's computer systems, quantum computing uses quantum bits (qubits) that can represent both 0s and 1s, and therefore perform two calculations at once. While a large-scale quantum computer may not be built in the next decade, the existing infrastructure requires standardization of publicly known and understood algorithms that offer a secure approach, according to NIST. The deadline for submissions was in November 2017, analysis of the proposals is expected to take three to five years.
History of cryptography
The word "cryptography" is derived from the Greek kryptos, meaning hidden.
The prefix "crypt-" means "hidden" or "vault," and the suffix "-graphy" stands for "writing."
The origin of cryptography is usually dated from about 2000 B.C., with the Egyptian practice of hieroglyphics. These consisted of complex pictograms, the full meaning of which was only known to an elite few.
The first known use of a modern cipher was by Julius Caesar (100 B.C. to 44 B.C.), who did not trust his messengers when communicating with his governors and officers. For this reason, he created a system in which each character in his messages was replaced by a character three positions ahead of it in the Roman alphabet.
In recent times, cryptography has turned into a battleground of some of the world's best mathematicians and computer scientists. The ability to securely store and transfer sensitive information has proved a critical factor in success in war and business.
Because governments do not want certain entities in and out of their countries to have access to ways to receive and send hidden information that may be a threat to national interests, cryptography has been subject to various restrictions in many countries, ranging from limitations of the usage and export of software to the public dissemination of mathematical concepts that could be used to develop cryptosystems.
However, the internet has allowed the spread of powerful programs and, more importantly, the underlying techniques of cryptography, so that today many of the most advanced cryptosystems and ideas are now in the public domain.
This was last updated in September 2021
Continue Reading About cryptography
Cryptography quiz questions and answers: Test your smarts
Quantum computers mean cryptography needs to change, and soon
What is post-quantum cryptography and should we care?
Weighing double key encryption challenges, payoffs
Find out what's new in cryptography from NIST
Related Terms
identity provider
An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of ...
See complete definition
password spraying
Password spraying is a cyberattack tactic that involves a hacker using a single password to try and break into multiple target ...
See complete definition
phishing
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...
See complete definition
Dig Deeper on Identity and access management
Preparing IT security for the age of quantum computing
By: Cliff Saran
cryptosystem
By: Corinne Bernstein
post-quantum cryptography
By: Rob Clyde
Quantum computing and the bigger picture
By: Cliff Saran
Sponsored News
A Generative AI Use Case Brought to Life with Solutions from Dell Technologies
–Dell Technologies and Intel
Servers and Security: 4 Keys to Maximizing End-to-End Protection
–Dell Technologies and Intel
See More
Vendor Resources
Securing Cloud Applications
–VMware Tanzu
Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup
–TechTarget ComputerWeekly.com
Latest TechTarget resources
Networking
CIO
Enterprise Desktop
Cloud Computing
Computer Weekly
Networking
Arista adds network change analysis to CloudVision
Arista's CloudVision Universal Network Observability analyses network changes to assess their impact on applications and ...
How to ensure optimal network workload placement
Network and cybersecurity requirements are the most important considerations when designing how to deploy new network workloads ...
Using microservices and containers in network automation
Networking can benefit from the modularity of containers. This guide helps network teams navigate the integration of ...
CIO
DMA targets big tech platforms, furthers EU's data strategy
The EU's Digital Markets Act forces big tech companies to open their platforms to third parties and make data more accessible.
Is the metaverse dead? Here's what happened and what's next
What happened to the metaverse? It's still here, even if the term no longer generates much enthusiasm, and finding useful ...
Metaverse interoperability challenges and impact
An open metaverse that mimics how we operate in the real world depends on interoperability. What is interoperability, why is it ...
Enterprise Desktop
How to create a local admin account with Microsoft Intune
Local admin accounts can cause problems for Windows administrators due to their lack of oversight and privileged account status. ...
How to add and enroll devices to Microsoft Intune
The Intune enrollment process can follow several paths, but one of the most common and efficient approaches involves Windows ...
How IT can use the gpresult command to check GPOs
When Windows issues arise, desktop administrators can use the gpresult utility to see what Group Policy settings are in place and...
Cloud Computing
Top public cloud providers of 2024: A brief comparison
How do AWS, Microsoft and Google stack up against each other when it comes to regions, zones, interfaces, costs and SLAs? We ...
Top 6 soft skills in IT that cloud teams need
Soft skills play a bigger part in successful cloud deployments than you might think. Technical skills are obviously essential in ...
Pros and cons of CS degrees vs. cloud certification programs
Standards for IT qualifications are changing with the rapid pace of cloud adoption. See how experts evaluate the debate between ...
ComputerWeekly.com
A new security partnership to build a silicon valley in South Wales
The £140m acquisition of Newport Wafer Fab by American firm Vishay is to be welcomed but the UK needs needs security, stability ...
Openreach, Focus Group boost broadband focus in South West England
Openreach claims major milestone inunderserved region’s digital transformation, while UK provider of essential business ...
Labour will use AI to grow the economy by 0.5%, says shadow tech secretary Peter Kyle
The Labour Party plans to promote the use of artificial intelligence in small businesses and across government to grow the ...
About Us
Editorial Ethics Policy
Meet The Editors
Contact Us
Videos
Photo Stories
Definitions
Guides
Advertisers
Partner with Us
Media Kit
Corporate Site
Contributors
Reprints
Events
E-Products
All Rights Reserved,
Copyright 2000 - 2024, TechTarget
Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information
Close
What Is Cryptography? Definition & How It Works | Okta
What Is Cryptography? Definition & How It Works | Okta
Okta
Looks like you have Javascript turned off! Please enable it to improve your browsing experience.
Skip to main content
Next Generation Authorization—Okta Fine Grained Authorization is here
Next Generation Authorization—Okta Fine Grained Authorization is here
Register now
Register now
Register now
+1 (800) 425-1267
Chat with Sales
Search
United States
United KingdomFranceGermanyJapanNetherlandsAustraliaSingaporeKoreaSweden
Products
Products
With flexibility and neutrality at the core of our Customer Identity and Workforce Identity Clouds, we make seamless and secure access possible for your customers, employees, and partners.
Free trial
Pricing
Customer Identity Cloud
Actions
Multifactor Authentication
Passwordless
Single Sign On
Universal Login
Explore Customer Identity Cloud
Workforce Identity Cloud
Single Sign On
Adaptive MFA
Lifecycle Management
Workflows
Identity Governance
Privileged Access
Explore Workforce Identity Cloud
Why Okta
Why Okta
Okta gives you a neutral, powerful and extensible platform that puts identity at the heart of your stack. No matter what industry, use case, or level of support you need, we’ve got you covered.
Your Goals
High-Performing IT
Optimized Digital Experiences
Identity-Powered Security
Innovation Without Compromise
Agile Workforces
Your Industry
Public Sector
Financial Services
Retail
Healthcare
Travel & Hospitality
Technology
Energy
Nonprofit
Ensuring Success
Okta AI
Okta Integration Network
For Small Businesses (SMBs)
Customer Success Stories
Okta Advantage
Trust
Developers
For Developers
Start building with powerful and extensible out-of-the-box features, plus thousands of integrations and customizations. Our developer community is here for you.
Customer Identity Cloud
Auth0 Marketplace
Developer Center
Community
Knowledge Base
Customer Identity Cloud Status
Workforce Identity Cloud
Okta Integration Network
Developer Center
Community
Knowledge Base
Workforce Identity Cloud Status
Resources
Resources and support
Okta gives you a neutral, powerful and extensible platform that puts identity at the heart of your stack. No matter what industry, use case, or level of support you need, we’ve got you covered.
Resources
Customer Case Studies
Events
Podcasts
Blog
Press Room
Analyst Research
Datasheets
Demo Library
Videos
Webinars
Whitepapers
Customer Success
Customer First Overview
Okta Community
Support Services
Professional Services
Expert Assist
Training
Certification
Find a Partner
Support
Help and Support
Product Documentation
Knowledge Base
Frequently Asked Questions
Contact Us
Customer Identity Cloud Status
Workforce Identity Cloud Status
Free trial
Contact us
Login
Questions? Contact us:
1 (800) 425-1267
Identity 101
What Is Cryptography? Definition & How It Works
What Is Cryptography? Definition & How It Works
Learn how Adaptive Multi-Factor Authentication combats data breaches, weak passwords, and phishing attacks.
Read more
Okta
Updated: 04/21/2022 - 12:27
Time to read: 9 minutes
Modern cryptography is a method of sending and receiving messages that only the intended receiver and sender can read — to prevent third-party access. It often involves encryption of electronic data, which commonly creates ciphertext by scrambling regular text. Then, it uses a decryption key of some form to return it to readable format on the receiving end. Cryptography can involve either a symmetric key system, which is the simplest, or an asymmetric key system, which is typically more secure. Cryptography provides methods for secure communication and electronic data that malicious adversaries cannot read, interpret, or access.
What is cryptography?
Cryptography is used to keep messages and data secure from being accessible to anyone other than the sender and the intended recipient. It is the study of communications and a form of security for messaging. Ultimately, cryptography can keep data from being altered or stolen. It can also be used to authenticate users. Cryptography often uses encryption and an algorithm to keep electronic data and messages secure and only readable by the intended parties. Cryptography has been around for centuries. The term itself comes from the Greek word kryptos, which translates to hidden. Today, cryptography is based on computer science practices and mathematical theory.
Types of cryptography
There are two main types of cryptography used for digital data and secure messages today: symmetric cryptography and asymmetric cryptography. Hash functions, a third type, doesn’t involve use of a key.
Symmetric cryptography: This is one of the most commonly used and simplest forms of encrypting and decrypting electronic data. It is also called secret-key or private-key cryptography. With symmetric cryptography, both the sender and the recipient will have the same key. This key is used to encrypt messages and data on one end and then decrypt it on the other end. Before communications begin, both parties must have the same secret key. Symmetric cryptography is fast, easy to use, and best suited for transmitting large amounts of data or for bulk encryption. The issue with this form of cryptography is that if a third party gets the secret key, they too can read and decrypt the data or messages. There are two main forms of symmetric encryption algorithms: stream and block algorithms.
Stream algorithm: This type encrypts the data while it is being streamed; therefore, it is not stored in the system’s memory. One of the most popular stream ciphers is the RC4 (Rivest Cipher 4), which encrypts messages one byte at a time.
Block algorithms: This type encrypts specific lengths of bits in blocks of data using the secret key. The data is held within the system’s memory while blocks are completed. The Advanced Encryption Standard (AES) is the most commonly used symmetric algorithm. Blocks of 128-bit data are encrypted and decrypted using cryptographic keys of 128, 192, and 256 bits. The AES is FIPS (Federal Information Processing Standards) approved under guidance from NIST (National Institute of Standards and Technology).
Asymmetric cryptography: This is also called public-key cryptography, and it involves the use of two different keys. A public key is distributed widely to everyone to encrypt data. This key is required to send messages and encrypt them. A sender can request the public key for the recipient to encrypt the data. Then, it will require the private key, which is kept secret, to decrypt the message. The key pair of the private and public key are mathematically related. Both keys are needed to perform operations, send and receive encrypted data and messages, and access sensitive data. Asymmetric cryptography needs higher processing and longer keys, with pieces of data that are smaller than the key; therefore, is often used on a smaller scale. Asymmetric and symmetric cryptography can be used together in a cryptosystem. Asymmetric cryptography can be used to encrypt symmetric keys, for example, while the symmetric cryptography is used to transmit or encrypt larger amounts of data.
Hash functions: This is a third type of cryptography that does not use a key. It uses a fixed length hash value based on the plain text message. This can then be used to ensure that the message has not been altered or compromised. Hash functions add an extra layer of security, as the hashed output can’t be reversed to reveal the data that was originally input.
What is cryptography used for?
The intention of cryptography is to keep data and messages secure and inaccessible to potential threats or bad actors. It is often working behind the scenes to encrypt and decrypt data you are sending through social media, applications, interactions on websites, and email. Symmetric cryptography can be used for these purposes:
Card transactions and payment applications
Random number generation
Signature verification to ensure the sender is who they claim to be
Asymmetric cryptography can be used for the following purposes:
Email messages
SIM card authentication
Web security
Exchange of private keys
Key principles of cryptography
Cryptography strives for private communications and data security to protect digital information from being altered, accessed, or read by anyone other than those with legitimate access. These are key principles of cryptography:
Confidentiality: The basis of cryptography relies on the information being kept private and confidential from third-party or malicious adversaries. Confidentiality agreements contain specific guidelines and rules that are meant to ensure that information is restricted, secure, and only accessible to certain people or within certain arenas.
Encryption: Encryption is what converts readable data into an unreadable form to protect the privacy as messages or data are sent between a sender and a receiver. This is typically done using an algorithm.
Decryption: The reverse of encryption is decryption, and this is returning the data to its original and readable form. Typically, this is performed using a specific key, which can be the same for encryption and decryption or require two different keys.
Data integrity: Data needs to stay consistent and accurate over its entire lifestyle, and data integrity can help to maintain this accuracy. Data cannot be altered anywhere in the communication path. It all needs to remain intact between the sender and the receiver.
Authentication: This is to determine that the message or data received is sent from the actual originator of the message. The sender is often required to verify that they are indeed the originator of the message received by the recipient.
Non-repudiation: This is the ability to ensure that the originator of a message or piece of data is unable to deny the authenticity of their signature. The use of digital signatures can prevent the originator or sender from denying their communication.
Best practices
Messages and data should always be encrypted to ensure privacy and security. The best practices for cryptography include using an entire cryptographic system, or cryptosystem, that regularly uses multiple forms of encryption to keep data and communications safe and secure. This system should have an easy-to-use interface along with strong cryptographic algorithms that conform to the industry’s best practices. For symmetric encryption, this means using AES with 128, 192, or 256-bit keys. For asymmetric encryption standards, it should include elliptical curve cryptography (ECC) and RSA. These are examples of files and data that should be encrypted and protected with cryptography:
Email and messages
Critical and sensitive files
Company data
Payment information
Personal identification details
Cryptographic methods need to be effective, but also user-friendly to ensure that they are actually going to be used as intended. Using encryption functions can also help to prevent the loss or theft of data even if the hardware itself is stolen or compromised. A strong cryptosystem should be able to hold up to the security community and not rely on security through obscurity. Instead, the system should be known, and the only thing kept secret and private are the actual keys. The public key can be publicized, but the secret or private key should be protected. These are methods for keeping your keys secure:
Do not store your encryption keys in clear text or along with the data that is encrypted.
Store your keys in a file system protected with strong access control lists (ACLs) while adhering to the principle of least privilege — access only to those who need it.
Use a second encryption key to encrypt your data encryption keys, generated using password-based encryption (PBE). A small number of administrators can use a password to generate a key to avoid storing the key in an unencrypted form within the system.
Use a tamper-resistant hardware appliance called a hardware security model (HSM) that can securely store keys. When data is needed to be decrypted, code can make an application programming interface (API) call to the HSM.
Key takeaways
Cryptography is a necessary form of cybersecurity that uses encryption methods to keep digital data and communications secure and out of the hands of potential threats or bad actors. Data protection is highly important in this digital era where so much information is stored on computers, in the cloud, and on the internet. Data security is important to businesses, industries, companies, and individuals alike. Cryptography is a form of securing digital data and messages often using special keys that only the sender and recipient have access to. Cryptography uses mathematical systems and algorithms to encrypt and decrypt data. Symmetrical cryptography uses the same key for both encryption and decryption. It can quickly encrypt and decrypt data, and it is easy to use. It can also be compromised if a third party gains access to the key, however. It is important to keep your data encryption keys safe and secure. Sending your encryption key in a plain text form along with your encrypted message, for example, is similar to leaving your front door key in plain sight in front of your locked door. Keep your keys safe to keep your data safe. Asymmetrical cryptography is a step further than symmetrical cryptography, using different keys for encryption and decryption. The encryption key is “public,” and everyone has access to it. The decryption key is kept “private,” and only intended recipients can have access to this secret key. While this adds an extra layer of security, it can also take longer to encrypt and decrypt data, so it is regularly used for smaller bits of data. A strong cryptosystem often uses multiple forms of encryption and cryptographic methods to keep digital data private and secure from adversaries. Cryptography is a vital component of digital security.
References
Definition of ‘Cryptography.’ (January 2022). The Economic Times.
Security Component Fundamentals for Assessment. (2020). Security Controls Evaluation, Testing, and Assessment Handbook (Second Edition).
Advanced Encryption Standard (AES). (2001). National Institute of Standards and Technology (NIST).
Compliance FAQs: Federal Information Processing Standards (FIPS). (November 2019). National Institute of Standards and Technology (NIST).
Security and Privacy in the Internet of Things. (2016). Internet of Things.
Elliptical Curve Cryptography ECC. (June 2020). National Institute of Standards and Technology (NIST).
To connect with a product expert today, use our chat box, email us, or call +1-800-425-1267.
Contact Us
YouTube
Footer Navtane22
Company
About Us
Our Customers
Leadership
Investors
Careers
Events
Press Room
Partners
Responsibility
Okta for Good
Diversity, Inclusion & Belonging
Starting with Okta
The Okta Advantage
Customer Identity Cloud
Workforce Identity Cloud
Free Trial
Pricing
Contact Sales
Trust
Accessibility
Help & Support
Help and Support
Frequently Asked Questions
Contact Us
Customer Identity Cloud Status
Workforce Identity Cloud Status
Footer utility Navtane22
Privacy Policy
Site Terms
Security
Sitemap
Cookie Preferences
Your Privacy Choices
Copyright © 2024 Okta. All rights reserved.
Footer utility Navtane22
Privacy Policy
Site Terms
Security
Sitemap
Cookie Preferences
Your Privacy Choices
United States
United KingdomFranceGermanyJapanNetherlandsAustraliaSingaporeKoreaSweden
Access Denied
Access Denied
Access Denied
You don't have permission to access "http://www.linode.com/docs/guides/what-is-cryptography/" on this server.
Reference #18.c64d2501.1710270813.30a1fb96