{"id":25782,"date":"2014-09-01T22:42:53","date_gmt":"2014-09-02T02:42:53","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25782"},"modified":"2014-09-01T22:42:53","modified_gmt":"2014-09-02T02:42:53","slug":"what-is-cryptography-definition-from-whatis-com","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/what-is-cryptography-definition-from-whatis-com.php","title":{"rendered":"What is cryptography? &#8211; Definition from WhatIs.com"},"content":{"rendered":"<p><p>    Cryptography is a method of storing and transmitting data in a    particular form so that only those for whom it is intended can    read and process it.  <\/p>\n<p>    Cryptography is closely related to the disciplines of cryptology    and     cryptanalysis. Cryptography includes techniques such as    microdots, merging words with images, and other ways to hide    information in storage or transit. However, in today's    computer-centric world, cryptography is most often associated    with scrambling plaintext    (ordinary text, sometimes referred to as cleartext) into        ciphertext (a process called encryption),    then back again (known as decryption). Individuals who practice    this field are known as cryptographers.  <\/p>\n<p>    Modern cryptography concerns itself with the following four    objectives:  <\/p>\n<p>    1) Confidentiality (the information cannot be understood    by anyone for whom it was unintended)  <\/p>\n<p>    2) Integrity (the information cannot be altered in    storage or transit between sender and intended receiver without    the alteration being detected)  <\/p>\n<p>    3) Non-repudiation (the creator\/sender of the    information cannot deny at a later stage his or her intentions    in the creation or transmission of the information)  <\/p>\n<p>    4) Authentication (the sender and receiver can confirm    each other?s identity and the origin\/destination of the    information)  <\/p>\n<p>    Procedures and protocols    that meet some or all of the above criteria are known as    cryptosystems. Cryptosystems are often thought to refer only to    mathematical procedures and computer programs; however, they    also include the regulation of human behavior, such as choosing    hard-to-guess passwords, logging off unused systems, and not    discussing sensitive procedures with outsiders.  <\/p>\n<p>    The word is derived from the Greek kryptos, meaning    hidden. The origin of cryptography is usually dated from about    2000 BC, with the Egyptian practice of hieroglyphics. These    consisted of complex pictograms, the full meaning of which was    only known to an elite few. The first known use of a modern    cipher    was by Julius Caesar (100 BC to 44 BC), who did not trust his    messengers when communicating with his governors and officers.    For this reason, he created a system in which each character in    his messages was replaced by a character three positions ahead    of it in the Roman alphabet.  <\/p>\n<p>    In recent times, cryptography has turned into a battleground of    some of the world's best mathematicians and computer    scientists. The ability to securely store and transfer    sensitive information has proved a critical factor in success    in war and business.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/searchsoftwarequality.techtarget.com\/definition\/cryptography\" title=\"What is cryptography? - Definition from WhatIs.com\">What is cryptography? - Definition from WhatIs.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25782","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25782"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25782"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25782\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}