{"id":385,"date":"2014-01-23T11:04:32","date_gmt":"2014-01-23T11:04:32","guid":{"rendered":"http:\/\/www.opensource.im\/?p=385"},"modified":"2014-01-23T11:04:32","modified_gmt":"2014-01-23T11:04:32","slug":"cryptography-wikipedia-the-free-encyclopedia","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-wikipedia-the-free-encyclopedia.php","title":{"rendered":"Cryptography &#8211; Wikipedia, the free encyclopedia"},"content":{"rendered":"<p><p>\"Secret code\" redirects here. For the Aya Kamiki album, see    Secret    Code.    <\/p>\n<p>    Cryptography (or cryptology; from Greek    ,    \"hidden, secret\"; and ,    graphein, \"writing\", or -,    -logia, \"study\",    respectively)[1] is the    practice and study of techniques for secure communication in    the presence of third parties (called adversaries).[2]    More generally, it is about constructing and analyzing protocols that overcome the    influence of adversaries[3]    and which are related to various aspects in information security such as data    confidentiality, data    integrity, authentication, and non-repudiation.[4]    Modern cryptography intersects the disciplines of mathematics,    computer science, and electrical engineering.    Applications of cryptography include ATM cards, computer passwords, and    electronic commerce.  <\/p>\n<p>    Cryptography prior to the modern age was effectively synonymous    with encryption, the conversion of information    from a readable state to apparent nonsense. The originator of an encrypted    message shared the decoding technique needed to recover the    original information only with intended recipients, thereby    precluding unwanted persons to do the same. Since World WarI    and the advent of the computer, the methods used to carry out    cryptology have become increasingly complex and its application    more widespread.  <\/p>\n<p>    Modern cryptography is heavily based on mathematical theory and    computer science practice; cryptographic algorithms are    designed around computational hardness    assumptions, making such algorithms hard to break in    practice by any adversary. It is theoretically possible to    break such a system but it is infeasible to do so by any known    practical means. These schemes are therefore termed    computationally secure; theoretical advances, e.g.,    improvements in integer factorization algorithms,    and faster computing technology require these solutions to be    continually adapted. There exist information-theoretically secure schemes that    provably cannot be broken even with unlimited computing    poweran example is the one-time padbut these schemes are more    difficult to implement than the best theoretically breakable    but computationally secure mechanisms.  <\/p>\n<p>    Cryptology-related technology has raised a number of legal    issues. In the United Kingdom, additions to the Regulation of    Investigatory Powers Act 2000 require a suspected criminal    to hand over his or her decryption key if asked by law    enforcement. Otherwise the user will face a criminal    charge.[5] The    Electronic Frontier    Foundation (EFF) was involved in a case in the United    States which questioned whether requiring suspected criminals    to provide their decryption keys to law enforcement is    unconstitutional. The EFF argued that this is a    violation of the right of not being forced to incriminate    oneself, as given in the fifth    amendment.[6]  <\/p>\n<p>    Until modern times cryptography referred almost exclusively to    encryption, which is the process of converting ordinary    information (called plaintext) into unintelligible text (called    ciphertext).[7]    Decryption is the reverse, in other words, moving from the    unintelligible ciphertext back to plaintext. A cipher (or cypher)    is a pair of algorithms that create the encryption and the    reversing decryption. The detailed operation of a cipher is    controlled both by the algorithm and in each instance by a    \"key\". This is a secret (ideally known    only to the communicants), usually a short string of    characters, which is needed to decrypt the ciphertext. A    \"cryptosystem\" is the ordered list of    elements of finite possible plaintexts, finite possible    cyphertexts, finite possible keys, and the encryption and    decryption algorithms which correspond to each key. Keys are    important, as ciphers without variable keys can be trivially    broken with only the knowledge of the cipher used and are    therefore useless (or even counter-productive) for most    purposes. Historically, ciphers were often used directly for    encryption or decryption without additional procedures such as    authentication or integrity checks.  <\/p>\n<p>    In colloquial use, the term \"code\" is often used to mean any    method of encryption or concealment of meaning. However, in    cryptography, code has a more specific meaning. It means    the replacement of a unit of plaintext (i.e., a meaningful word    or phrase) with a code word (for example, wallaby    replaces attack at dawn). Codes are no longer used in    serious cryptographyexcept incidentally for such things as    unit designations (e.g., Bronco Flight or Operation    Overlord)since properly chosen ciphers are both more practical    and more secure than even the best codes and also are better    adapted to computers.  <\/p>\n<p>    Cryptanalysis is the term used for the    study of methods for obtaining the meaning of encrypted    information without access to the key normally required to do    so; i.e., it is the study of how to crack encryption algorithms    or their implementations.  <\/p>\n<p>    Some use the terms cryptography and cryptology    interchangeably in English, while others (including US military    practice generally) use cryptography to refer    specifically to the use and practice of cryptographic    techniques and cryptology to refer to the combined study    of cryptography and cryptanalysis.[8][9]    English is more flexible than several other languages in which    cryptology (done by cryptologists) is always used in the    second sense above. In the English Wikipedia the general term    used for the entire field is cryptography (done by    cryptographers).  <\/p>\n<p>    The study of characteristics of languages which have some    application in cryptography (or cryptology), i.e. frequency    data, letter combinations, universal patterns, etc., is called    cryptolinguistics.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cryptography\" title=\"Cryptography - Wikipedia, the free encyclopedia\">Cryptography - Wikipedia, the free encyclopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> \"Secret code\" redirects here. For the Aya Kamiki album, see Secret Code<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-385","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/385"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}