{"id":384,"date":"2014-01-23T11:04:28","date_gmt":"2014-01-23T11:04:28","guid":{"rendered":"http:\/\/www.opensource.im\/?p=384"},"modified":"2014-01-23T11:04:28","modified_gmt":"2014-01-23T11:04:28","slug":"cryptography-definition-from-answers-com","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-definition-from-answers-com.php","title":{"rendered":"cryptography: Definition from Answers.com"},"content":{"rendered":"<p><p>cryptography (krptg'rf)    [Gr.,=hidden writing], science of secret writing. There are    many devices by which a message can be concealed from the    casual reader, e.g., invisible writing, but the term    cryptography strictly applies to translating messages into    cipher or code. The science of breaking codes and ciphers    without a key is called cryptanalysis. Cryptology is the    science that embraces both cryptography and cryptanalysis. In    enciphering, each letter of the message is replaced by another    letter or figure; in encoding, syllables, words, or whole    sentences are treated. The code is the agreed upon set of rules    whereby messages are converted from one form to another. The    beginnings of cryptography can be traced to the hieroglyphs of    early Egyptian civilization (c.1900 B.C.). Ciphering has always    been considered vital for diplomatic and military secrecy; the    Bible is replete with examples of ciphering, and many figures    throughout history have written in ciphers, including Julius    Caesar, Charlemagne, Alfred the Great, Mary Queen of Scots, and    Louis XIV. Francis Bacon's celebrated biliteral cipher (1605)    was an arrangement of the letters a and b in    five-letter combinations, each representing a letter of the    alphabet. This code illustrates the important principle that a    code employing only two different signs can be used to transmit    information. In the 20th cent. mathematical theory and computer    science have both been applied to cryptanalysis. As the science    of cryptology becomes increasingly sophisticated, most nations    have found it necessary to develop special governmental bureaus    to handle diplomatic and military security, e.g., the National    Security Agency in the United States. The widespread use of    computers and data transmission in commerce and finance is    making cryptography very important in these fields as well.    Recent successes in applying certain aspects of computer    science to cryptography seem to be leading to more versatile    and more secure systems in which encryption is implemented with    sophisticated digital electronics. Industry and the U.S.    government, however, have argued over who will have ultimate    control over data    encryption and, as a result, over government access to    encrypted private transmissions.    <\/p>\n<p>      Bibliography    <\/p>\n<p>      See H. Gaines, Cryptanalysis (1956); J. R. Wolfe,      Secret Writing (1970); D. Denning, Cryptography and      Data Security (1982); C. A. Deavors and L. Kruh,      Machine Cryptography and Modern Cryptoanalysis (1985);      D. Kahn, The Codebreakers (rev. ed. 1996); S. Singh,      The Code Book (1999).    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.answers.com\/topic\/cryptography\" title=\"cryptography: Definition from Answers.com\">cryptography: Definition from Answers.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> cryptography (krptg'rf) [Gr.,=hidden writing], science of secret writing. There are many devices by which a message can be concealed from the casual reader, e.g., invisible writing, but the term cryptography strictly applies to translating messages into cipher or code. The science of breaking codes and ciphers without a key is called cryptanalysis. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-384","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/384"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=384"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/384\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}