cryptography: Definition from Answers.com

cryptography (krptg'rf) [Gr.,=hidden writing], science of secret writing. There are many devices by which a message can be concealed from the casual reader, e.g., invisible writing, but the term cryptography strictly applies to translating messages into cipher or code. The science of breaking codes and ciphers without a key is called cryptanalysis. Cryptology is the science that embraces both cryptography and cryptanalysis. In enciphering, each letter of the message is replaced by another letter or figure; in encoding, syllables, words, or whole sentences are treated. The code is the agreed upon set of rules whereby messages are converted from one form to another. The beginnings of cryptography can be traced to the hieroglyphs of early Egyptian civilization (c.1900 B.C.). Ciphering has always been considered vital for diplomatic and military secrecy; the Bible is replete with examples of ciphering, and many figures throughout history have written in ciphers, including Julius Caesar, Charlemagne, Alfred the Great, Mary Queen of Scots, and Louis XIV. Francis Bacon's celebrated biliteral cipher (1605) was an arrangement of the letters a and b in five-letter combinations, each representing a letter of the alphabet. This code illustrates the important principle that a code employing only two different signs can be used to transmit information. In the 20th cent. mathematical theory and computer science have both been applied to cryptanalysis. As the science of cryptology becomes increasingly sophisticated, most nations have found it necessary to develop special governmental bureaus to handle diplomatic and military security, e.g., the National Security Agency in the United States. The widespread use of computers and data transmission in commerce and finance is making cryptography very important in these fields as well. Recent successes in applying certain aspects of computer science to cryptography seem to be leading to more versatile and more secure systems in which encryption is implemented with sophisticated digital electronics. Industry and the U.S. government, however, have argued over who will have ultimate control over data encryption and, as a result, over government access to encrypted private transmissions.

Bibliography

See H. Gaines, Cryptanalysis (1956); J. R. Wolfe, Secret Writing (1970); D. Denning, Cryptography and Data Security (1982); C. A. Deavors and L. Kruh, Machine Cryptography and Modern Cryptoanalysis (1985); D. Kahn, The Codebreakers (rev. ed. 1996); S. Singh, The Code Book (1999).

More:

cryptography: Definition from Answers.com

What is cryptography? – A Word Definition From the …

Main TERM C The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.

As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is Pretty Good Privacy because it's effective and free.

Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses.

TECH RESOURCES FROM OUR PARTNERS

Continue reading here:

What is cryptography? - A Word Definition From the ...

To Foil NSA Spies, Encrypt Everything

In the world of cybersecurity, Bruce Schneier is an unusually accessible voice for those of us who feel we dont quite understand whats going on. The author of 12 books, and a prolific blogger and speaker, Schneier helped the Guardian go through the top-secret documents from the U.S. National Security Agency leaked by Edward Snowden last year.

So he knows what hes talking about when discussing the import of Snowdens revelations, which he did Wednesday at the Real World Cryptography Workshop, held in the gothic Great Hall at City University of New York in upper Manhattan.

Honestly, my favorite thing about these documents is the code names, he said, to laughter from the mostly male, relatively young crowd. He rattled them off: FoxAcid, Ferret Cannon, United Rake, Blackheart, Blarney, Quantum. His vote for the stupidest: EgotisticalGiraffe, an exploit aimed at the Firefox browser.

Schneier quickly turned serious. Were faced with a government agency on a quixotic mission to collect everything, from chats in online gaming worlds like Second Life, to data passed from air to ground when you use a laptop on a plane, he said. And while the NSA may have turned the Internet into a giant surveillance platform, this is just what every nation state is doing.

We actually dont know whats broken, he said. I get asked all the time, can I trust this, can I trust that? The truth is we dont know, and we have to move forward.

There is some good news in the Snowden documents, Schneier said, and thats that encryption still works. The NSA has often been able to get around it because other parts of the equation, like software or hardware, are insecure. Still, most current cryptography gives the NSA some trouble, and a lot of the data that the NSA snags isnt encrypted. That means were making it too easy for the NSA to pursue its collect everything mania. Schneiers solution: encrypt everything we can, from the cloud to cell phones.

Schneiers not advocating stopping the NSA from targeted spyingthered be no debate right now if Snowdens documents had shown the NSA spying on North Korea and the Taliban. He just wants to make it cheaper for the NSA to target the bad guys than for them to target everybody and get the bad guys incidentally.

Above all, we have to shift the terms of the debate, he said. Defenders of the NSA cast us in an arms raceif we dont do it, others will. Thats absolutely the wrong argument, he said. Its not us vs. them, its security vs. insecurity. Either we build an Internet that is secure for all users, or an Internet that is vulnerable to all attackers.

Link:

To Foil NSA Spies, Encrypt Everything