{"id":16298,"date":"2014-04-15T21:51:18","date_gmt":"2014-04-16T01:51:18","guid":{"rendered":"http:\/\/www.opensource.im\/?p=16298"},"modified":"2014-04-15T21:51:18","modified_gmt":"2014-04-16T01:51:18","slug":"cryptography-simple-english-wikipedia-the-free-encyclopedia","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-simple-english-wikipedia-the-free-encyclopedia.php","title":{"rendered":"Cryptography &#8211; Simple English Wikipedia, the free encyclopedia"},"content":{"rendered":"<p><p>    Cryptography (also known as cryptology; comes    from Greek ,    kryptos, \"hidden, secret\"; and , grph, \"I write\", or -, -logia,    respectively)[1] is the practice and study of hiding information. It is    sometimes called code,    but this is not really a correct name. It is the science used to try to keep    information    secret and safe. Modern cryptography is a mix of mathematics,    computer science, and electrical engineering.    Cryptography is used in ATM (bank) cards, computer passwords, and    shopping on the internet.  <\/p>\n<p>    When a message is sent using cryptography, it is changed (or    encrypted) before it is sent. The method of changing    text is called a \"code\" or, more precisely, a \"cipher\". The    changed text is called \"ciphertext\". The change makes the    message hard to read. Someone who wants to read it must change    it back (or decrypt it). How to change it back is a    secret. Both the person that sends the    message and the one that gets it should know the secret way to    change it, but other people should not be able to. Studying the    cyphertext to discover the secret is called \"cryptanalysis\" or    \"cracking\" or sometimes \"code breaking\".  <\/p>\n<p>    Different types of cryptography can be easier or harder to use    and can hide the secret message better or worse. Ciphers use a    \"key\" which is a secret that hides the secret messages. The    cryptographic method needn't be secret. Various people can use    the same method but different keys, so they cannot read each    others' messages. Since the Caesar cipher has only as many keys    as the number of letters in the alphabet, it is easily cracked by trying all the    keys. Ciphers that allow billions of keys are cracked by more    complex methods.  <\/p>\n<p>    In symmetric cryptography, both the sender and receiver share    the key. The sender uses the key in a certain way to hide the    message. Then, the receiver will use the same key in the    opposite way to reveal the message. Most types of cryptography    are symmetric. Advanced Encryption    Standard is a widely used one.  <\/p>\n<p>    Asymmetric cryptography is harder to use. Each person who wants    to use asymmetric cryptography uses a secret key number, and a    different number, a \"public key\" that they can tell everyone.    If someone else wants to send this person a message, they'll    use the number they've been told to hide the message. Now the    message cannot be revealed, even by the sender, but the    receiver can easily reveal the message with his secret or    \"private key\". This way, nobody else needs to know the secret    key.  <\/p>\n<p>    The details of asymmetric cryptography make it less useful than    symmetric cryptography for actually sending messages. Instead,    it is often used for computer signatures, when a computer must know that a    file was sent from a certain sender. For example, computer    software companies that release updates for    their software can sign those updates to prove that the update    was made by them, so that hackers cannot make their own updates that would    cause harm. Computers can also use asymmetric ciphers to give    each other the keys for symmetric ciphers.  <\/p>\n<p>    Computers can do hard math very fast, and because of this they    can do very strong encryption. Examples are computer algorithms like    RSA, AES, Blowfish,    and many others. Using good algorithms like these can make it    very hard to read the information that is sent.  <\/p>\n<p>    People are better at patterns, changing order of words or    letters, and using words with different meanings. Because    people are slower than computers, any cryptography they use can    probably be broken if enough of the secret way to change it is    known.  <\/p>\n<p>    Simple forms of cryptography that people can do without    machines are Caesar ciphers and transposition ciphers,    but there are lots more. They are especially useful in espionage because a spy    won't be caught carrying a code machine.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/simple.wikipedia.org\/wiki\/Cryptography\" title=\"Cryptography - Simple English Wikipedia, the free encyclopedia\">Cryptography - Simple English Wikipedia, the free encyclopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cryptography (also known as cryptology; comes from Greek , kryptos, \"hidden, secret\"; and , grph, \"I write\", or -, -logia, respectively)[1] is the practice and study of hiding information. It is sometimes called code, but this is not really a correct name<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-16298","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16298"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=16298"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16298\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=16298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=16298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=16298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}