{"id":380,"date":"2014-01-23T11:04:17","date_gmt":"2014-01-23T11:04:17","guid":{"rendered":"http:\/\/www.opensource.im\/?p=380"},"modified":"2014-01-23T11:04:17","modified_gmt":"2014-01-23T11:04:17","slug":"what-is-cryptography-a-word-definition-from-the","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/what-is-cryptography-a-word-definition-from-the.php","title":{"rendered":"What is cryptography? &#8211; A Word Definition From the &#8230;"},"content":{"rendered":"<p><p>Main  TERM  C             The art of protecting information by transforming it (encrypting it) into an  unreadable format, called cipher text. Only those who possess  a secret key can decipher (or decrypt) the message into  plain text. Encrypted  messages can sometimes be broken by cryptanalysis, also called  codebreaking, although modern cryptography techniques  are virtually unbreakable.  <\/p>\n<p>    As the Internet and other    forms of electronic communication become more prevalent,    electronic security is    becoming increasingly important. Cryptography is used to    protect e-mail messages,    credit card information, and corporate data. One of the most    popular cryptography systems used on the Internet is Pretty Good    Privacy because it's effective and free.  <\/p>\n<p>    Cryptography systems can be broadly classified into symmetric-key    systems that use a single key that both the sender and    recipient have, and public-key    systems that use two keys, a public key known to everyone and a    private key that only the recipient of messages uses.  <\/p>\n<p>    TECH RESOURCES FROM OUR PARTNERS  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.webopedia.com\/TERM\/C\/cryptography.html\" title=\"What is cryptography? - A Word Definition From the ...\">What is cryptography? - A Word Definition From the ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Main TERM C The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-380","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/380"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/380\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}