What is a cryptographic cipher? (2024)

By

  • Peter Loshin,Former Senior Technology Editor
  • Linda Rosencrance

What is a cipher?

In cryptology, the discipline concerned with the study of cryptographic algorithms, a cipher is an algorithm for encrypting and decrypting data.

Symmetric key encryption, also called secret key encryption, depends on the use of ciphers, which operate symmetrically. With symmetric encryption algorithms, the same encryption key is applied to data in the same way, whether the objective is to convert plaintext to ciphertext or ciphertext to plaintext. A cipher transforms data by processing the original, plaintext characters or other data into ciphertext. The ciphertext should appear as random data.

Traditionally, ciphers used these two main types of transformation:

  1. Transposition ciphers keep all the original bits of data in a byte but mix their order.
  2. Substitution ciphers replace specific data sequences with other data sequences. For example, one type of substitution would be to transform all bits with a value of 1 to a value of 0, and vice versa.

The data output from either method is called the ciphertext.

Modern ciphers enable private communication in many different networking protocols, including the Transport Layer Security (TLS) protocol and others that offer encryption of network traffic. Many communication technologies, including phones, digital television and ATMs, rely on ciphers to maintain security and privacy.

How do ciphers work?

A cipher uses a system of fixed rules -- an encryption algorithm -- to transform plaintext, a legible message, into ciphertext, an apparently random string of characters. Ciphers can be designed to encrypt or decrypt bits in a stream, known as stream ciphers. Or they can process ciphertext in uniform blocks of a specified number of bits, known as block ciphers.

What is a cryptographic cipher? (1)

Modern cipher implementations depend on the algorithm and a secret key, which is used by the encryption algorithm to modify data as it is encrypted. Ciphers that use longer keys, measured in bits, are more effective against brute-force attacks. The longer the key length, the more brute-force attempts are necessary to expose the plaintext. While cipher strength is not always dependent on the length of the key, experts recommend modern ciphers be configured to use keys of at least 128 bits or more, depending on the algorithm and the use case.

A key is an essential part of an encryption algorithm -- so much so that, in real-world ciphering, the key is kept secret, not the algorithm. Strong encryption algorithms are designed so that, even if someone knows the algorithm, it should be impossible to decipher ciphertext without knowing the appropriate key. Consequently, before a cipher can work, both the sender and receiver must have a key or a set of keys.

What is a cryptographic cipher? (2)

With symmetric key algorithms, the same key is used for the encryption and decryption of data. Asymmetric key algorithms use public keys and private keys to encrypt and decrypt data.

In asymmetric cryptography, also known as public key cryptography, the keys are large numbers that have been paired together but are not identical (asymmetric). Key pairs include the following:

  • The public key can be shared with everyone.
  • The private, or secret key, is kept secret.

Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.

The private or secret key of the pair is used by the owner of the key pair to decrypt or encrypt data, while the public key is used by anyone who wants to encrypt a message that can be decrypted only by the holder of the private key.

What is a cryptographic cipher? (3)

What are ciphers used for?

Symmetric ciphers are most commonly used to secure online communications. They are also incorporated into many different network protocols to be used for exchanges of data. For example, Secure Sockets Layer and TLS use ciphers to encrypt application layer data, especially when used with HTTP Secure (HTTPS).

Virtual private networks that connect remote workers or remote branches to corporate networks use protocols with symmetric key algorithms to protect data communications. Symmetric ciphers protect data privacy in most Wi-Fi networks, online banking and e-commerce services, and mobile telephony.

Some protocols use asymmetric cryptography to encrypt and authenticate endpoints. They also use it to secure the exchange of symmetric keys to encrypt session data. Those protocols include the following:

  • TLS
  • HTTPS
  • Secure Shell
  • Open Pretty Good Privacy
  • Secure/Multipurpose Internet Mail Extensions

While public key cryptography is considered more secure than symmetric encryption, it is also more computationally intensive. For performance reasons, protocols often rely on symmetric key algorithms to encrypt session data.

Difference between codes and ciphers

Codes and ciphers are different ways to encrypt a message. A code is a method of changing a message by replacing each word with another word that has a different meaning.

On the other hand, a cipher converts the message using its algorithm to transform the data representing the letters and words in the message. Ciphers are easier to implement and use with computers because algorithms are automated and easily programmed.

Types of ciphers

Ciphers can be characterized in different ways, including the following:

  • Block ciphers encrypt uniformly sized blocks of data.
  • Stream ciphers can be applied to streams of data that are often received and sent over a network.

Ciphers can depend on traditional keys used directly to key ciphertext or on elliptical curve cryptography (ECC). When ECC is used with a 160-bit key, it can provide the security of a traditional cipher, like that used in the RSA (Rivest-Shamir-Adleman) cryptosystem using a key of 1,024 bits in length.

Modern-day encryption algorithms are designed to withstand attacks even when the attacker knows what cipher is being used. Historically, ciphers have been less secure against attack because they were used to encipher plaintext by hand and could be more easily analyzed and broken with computer power.

Examples of ciphers

Some well-known historical ciphers include the following:

  • Caesar. This cipher is attributed to Julius Caesar, who is said to have used it to communicate securely with his generals. It is a simple substitution cipher where each letter in the plaintext is shifted a specific number of places down the alphabet. The shift number said to be used by Caesar was three. Substitution ciphers are often implemented by writing down the plaintext alphabet, with the ciphertext alphabet written above the plaintext letters, shifted by the number those communicating agree to. A shift of three puts the letter D above the plaintext A, E above B and so on. The number of characters shifted is considered a simple form of a key.
  • Atbash. This cipher is a substitution cipher in which the plaintext alphabet is mapped onto itself but in reverse order. In other words, the plaintext letter A is mapped to ciphertext Z, B is mapped to Y, C to X and so on. Atbash is named after the two first and two last letters in the Hebrew alphabet. It is thought to have been in use for hundreds of years.
  • Simple substitution. This one has also been used for hundreds of years. It substitutes every plaintext character for a different ciphertext character, resulting in what is effectively a 26-character key. It differs from the Caesar cipher because the enciphering alphabet is completely jumbled, rather than simply shifted a uniform number of places.
  • Vigenère. This cipher is a form of polyalphabetic substitution, meaning it is based on substitution using multiple substitution alphabets. The Vigenère cipher uses a series of interwoven Caesar ciphers, based on the letters of a keyword. The original text is encrypted using what is known as the Vigenère square or Vigenère table.
  • hom*ophonic substitution. This substitution cipher uses several different ciphertext letters to replace single plaintext letters. This type of cipher is typically much more difficult to break than standard substitution ciphers.

These historical ciphers are still relevant because they use different fundamental components of modern ciphers, such as substitution and transposition.

Ciphers can go in and out of fashion, depending on their track records for strength against attacks, as well as the discovery of new attack vectors. Learn about the first steps to using ciphers securely by understanding the basics of symmetric key encryption algorithms.

This was last updated in October 2021

Continue Reading About cipher

  • The difference between AES and DES encryption
  • Format-preserving encryption use cases, benefits, alternative
  • How does Microsoft BitLocker secure local, cloud resources?
  • Symmetric vs. asymmetric encryption: Decipher the differences
  • Cryptography attacks: The ABCs of ciphertext exploits

Related Terms

What is SSH (Secure Shell) and How Does It Work?
SSH (Secure Shell or Secure Socket Shell) is a network protocol that gives users -- particularly systems administrators -- a ...Seecompletedefinition
What is the Cybersecurity Information Sharing Act (CISA)?
The Cybersecurity Information Sharing Act (CISA) allows United States government agencies and non-government entities to share ...Seecompletedefinition
What is the Driver's Privacy Protection Act (DPPA)?
The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personally identifiable ...Seecompletedefinition

Dig Deeper on Data security and privacy

  • What is Data Encryption Standard (DES)?By: PeterLoshin
  • cryptanalysisBy: TechTargetContributor
  • Advanced Encryption Standard (AES)By: RahulAwati
  • encryptionBy: RobertSheldon
What is a cryptographic cipher? (2024)

FAQs

What is a cipher in cryptography? ›

A cipher is a method used in cryptography for performing encryption or decryption. Essentially, it's a set of algorithms that you apply to your data (plaintext) to transform it into an unrecognizable form (ciphertext).

What is an example of a cryptographic cipher? ›

For example, "GOOD DOG" can be encrypted as "PLLX XLP" where "L" substitutes for "O", "P" for "G", and "X" for "D" in the message. Transposition of the letters "GOOD DOG" can result in "DGOGDOO". These simple ciphers and examples are easy to crack, even without plaintext-ciphertext pairs.

What is the use of crypto cipher? ›

Ciphers are used to scramble the data contained in a cryptocurrency transaction, so that it cannot be read or interpreted by unauthorized third parties. This is done by using a unique key or algorithm to encode the transaction data into a form that is only readable by those with access to the correct key or algorithm.

What is the difference between a code and a cipher? ›

A code is a set of letters, numbers, symbols, etc., that is used to secretly send messages to someone. A cipher is a method of transforming a text in order to conceal its meaning. A key phrase lets the sender tell the recipient what to use to decode a message. A key object is a physical item used to decrypt a code.

What is the hardest code to crack? ›

The Vigenère cipher is a method of encrypting messages by using a series of different Caesar ciphers based on the letters of a particular keyword. The Vigenère cipher is more powerful than a single Caesar cipher and is much harder to crack.

How to decode a cipher? ›

Cryptography 101: Basic solving techniques for substitution ciphers
  1. Scan through the cipher, looking for single-letter words. ...
  2. Count how many times each symbol appears in the puzzle. ...
  3. Pencil in your guesses over the ciphertext. ...
  4. Look for apostrophes. ...
  5. Look for repeating letter patterns.
Sep 27, 2021

What is the difference between a key and a cipher? ›

Cryptographic ciphers are used to convert ciphertext to plaintext and back. With symmetric key algorithms, the same key is used for the encryption and decryption of data. Asymmetric key algorithms use public keys and private keys to encrypt and decrypt data.

What is the difference between cipher and encryption? ›

Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A cipher converts the original message, called plaintext, into ciphertext using a key to determine how it is done.

What is cryptography in simple words? ›

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

What is the goal of cipher? ›

Ciphers are an indispensable aspect of modern-day data security. By enabling secure encryption and decryption of information, they serve as the bedrock of cybersecurity, safeguarding sensitive data from unauthorized access and cyber threats.

What are ciphers used for today? ›

Ciphers are used to provide encryption, authentication, and data integrity checks in file transfer protocols like FTPS, SFTP, and WEBDAVS as well as in data-at-rest systems like OpenPGP.

Why did people use ciphers? ›

Cipher systems prevailed, however, for military tactical communications because of the difficulty of protecting codebooks from capture or compromise in the field. In the early history of the United States, codes were widely used, as were book ciphers.

What is a cipher in simple terms? ›

A cipher is a method used in cryptography for performing encryption or decryption. Essentially, it's a set of algorithms that you apply to your data (plaintext) to transform it into an unrecognizable form (ciphertext). This process helps to protect sensitive information from unauthorized access.

How do you know if something is a cipher? ›

Another easy indicator you can check is if there is a periodic incidence of coincidence that has peaks at the keyword length. This is a feature of Beaufort, Vigenère, Porta, and Gronsfeld ciphers. Lastly, polygraphic ciphers the length of the ciphered text will always be a multiple of the size of the graph used.

How do you decode a cipher value? ›

Encrypt your message by replacing each letter with the corresponding shifted letter. For example, if the shift value is 3, the word “hello” would become “khoor”. To decrypt the message, simply reverse the process by shifting each letter back by the same amount.

What are the three types of ciphers? ›

There are various types of ciphers, including:
  • Substitution ciphers. Replace bits, characters, or character blocks in plaintext with alternate bits, characters or character blocks to produce ciphertext. ...
  • Transposition ciphers. ...
  • Polygraphic ciphers. ...
  • Permutation ciphers. ...
  • Private-key cryptography. ...
  • Public-key cryptography.

What is the difference between a cipher and an algorithm? ›

Ciphers are algorithms, more specifically they're a set of steps for performing a cryptographic function – it can be encryption, decryption, hashing or digital signatures.

Is AES a cipher? ›

The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection.

Top Articles
Overdrive Initiative Referral Bonus - Roberts Space Industries
Is Wisdom Tree Investments Inc (WT) Stock a Good Investment?
Ffxiv Act Plugin
NOAA: National Oceanic & Atmospheric Administration hiring NOAA Commissioned Officer: Inter-Service Transfer in Spokane Valley, WA | LinkedIn
Encore Atlanta Cheer Competition
Lifewitceee
Boomerang Media Group: Quality Media Solutions
Math Playground Protractor
Byrn Funeral Home Mayfield Kentucky Obituaries
Best Transmission Service Margate
Mr Tire Rockland Maine
Mikayla Campino Video Twitter: Unveiling the Viral Sensation and Its Impact on Social Media
Citymd West 146Th Urgent Care - Nyc Photos
Tracking Your Shipments with Maher Terminal
Best Suv In 2010
Google Feud Unblocked 6969
N2O4 Lewis Structure & Characteristics (13 Complete Facts)
Alfie Liebel
Tinker Repo
Hdmovie2 Sbs
Conan Exiles Sorcery Guide – How To Learn, Cast & Unlock Spells
Garnish For Shrimp Taco Nyt
Www.patientnotebook/Atic
Cb2 South Coast Plaza
Kimoriiii Fansly
Egusd Lunch Menu
1636 Pokemon Fire Red U Squirrels Download
Calvin Coolidge: Life in Brief | Miller Center
What Is Opm1 Treas 310 Deposit
Dailymotion
Package Store Open Near Me Open Now
Greater Orangeburg
King Soopers Cashiers Check
Clearvue Eye Care Nyc
Roadtoutopiasweepstakes.con
Panchang 2022 Usa
Royal Caribbean Luggage Tags Pending
Goodwill Thrift Store & Donation Center Marietta Photos
Clark County Ky Busted Newspaper
Ise-Vm-K9 Eol
Craigs List Palm Springs
Arigreyfr
Frigidaire Fdsh450Laf Installation Manual
Tlc Africa Deaths 2021
UWPD investigating sharing of 'sensitive' photos, video of Wisconsin volleyball team
The Complete Uber Eats Delivery Driver Guide:
The Sports Academy - 101 Glenwest Drive, Glen Carbon, Illinois 62034 - Guide
Bbwcumdreams
Slug Menace Rs3
10 Bedroom Airbnb Kissimmee Fl
Game Like Tales Of Androgyny
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 6028

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.