What is Cryptography? Definition from SearchSecurity (2024)

What is Cryptography? Definition from SearchSecurity (1)

By

  • Kathleen Richards

What is cryptography?

Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is intended can read and process it.

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email.

Cryptography techniques

Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes techniques such as microdots, merging words with images and other ways to hide information in storage or transit. In today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers.

Modern cryptography concerns itself with the following four objectives:

  1. Confidentiality. The information cannot be understood by anyone for whom it was unintended.
  2. Integrity. The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.
  3. Non-repudiation. The creator/sender of the information cannot deny at a later stage their intentions in the creation or transmission of the information.
  4. Authentication. The sender and receiver can confirm each other's identity and the origin/destination of the information.

Procedures and protocols that meet some or all the above criteria are known as cryptosystems. Cryptosystems are often thought to refer only to mathematical procedures and computer programs; however, they also include the regulation of human behavior, such as choosing hard-to-guess passwords, logging off unused systems and not discussing sensitive procedures with outsiders.

What is Cryptography? Definition from SearchSecurity (2)

Cryptographic algorithms

Cryptosystems use a set of procedures known as cryptographic algorithms, or ciphers, to encrypt and decrypt messages to secure communications among computer systems, devices and applications.

A cipher suite uses one algorithm for encryption, another algorithm for message authentication and another for key exchange. This process, embedded in protocols and written in software that runs on operating systems (OSes) and networked computer systems, involves the following:

  • Public and private key generation for data encryption/decryption.
  • Digital signing and verification for message authentication.
  • Key exchange.

Types of cryptography

Single-key or symmetric-key encryption algorithms create a fixed length of bits known as a block cipher with a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decipher it. One example of symmetric-key cryptography is the Advanced Encryption Standard (AES). AES is a specification established in November 2001 by the National Institute of Standards and Technology (NIST) as a Federal Information Processing Standard (FIPS 197) to protect sensitive information. The standard is mandated by the U.S. government and widely used in the private sector.

In June 2003, AES was approved by the U.S. government for classified information. It is a royalty-free specification implemented in software and hardware worldwide. AES is the successor to the Data Encryption Standard (DES) and DES3. It uses longer key lengths -- 128-bit, 192-bit, 256-bit -- to prevent brute-force and other attacks.

What is Cryptography? Definition from SearchSecurity (3)

Public-key or asymmetric-key encryption algorithms use a pair of keys, a public key associated with the creator/sender for encrypting messages and a private key that only the originator knows (unless it is exposed or they decide to share it) for decrypting that information.

Examples of public-key cryptography include the following:

  • RSA (Rivest-Shamir-Adleman), used widely on the internet.
  • Elliptic Curve Digital Signature Algorithm (ECDSA) used by Bitcoin.
  • Digital Signature Algorithm (DSA) adopted as a standard for digital signatures by NIST in FIPS 186-4.
  • Diffie-Hellman key exchange.

To maintain data integrity in cryptography, hash functions, which return a deterministic output from an input value, are used to map data to a fixed data size. Types of cryptographic hash functions include SHA-1 (Secure Hash Algorithm 1), SHA-2 and SHA-3.

Cryptography concerns

Attackers can bypass cryptography, hack into computers responsible for data encryption and decryption, and exploit weak implementations, such as the use of default keys. Cryptography makes it harder for attackers to access messages and data protected by encryption algorithms.

Growing concerns about the processing power of quantum computing to break current cryptography encryption standards led NIST to put out a call for papers among the mathematical and science community in 2016 for new public key cryptography standards. NIST announced it will have three quantum-resistant cryptographic algorithms ready for use in 2024.

Unlike today's computer systems, quantum computing uses quantum bits (qubits) that can represent both 0s and 1s, and therefore perform two calculations at once. While a large-scale quantum computer might not be built in the next decade, the existing infrastructure requires standardization of publicly known and understood algorithms that offer a secure approach, according to NIST.

History of cryptography

The word "cryptography" is derived from the Greek kryptos, meaning hidden.

The prefix "crypt-" means "hidden" or "vault," and the suffix "-graphy" stands for "writing."

The origin of cryptography is usually dated from about 2000 B.C., with the Egyptian practice of hieroglyphics. These consisted of complex pictograms, the full meaning of which was only known to an elite few.

The first known use of a modern cipher was by Julius Caesar (100 B.C. to 44 B.C.), who did not trust his messengers when communicating with his governors and officers. For this reason, he created a system in which each character in his messages was replaced by a character three positions ahead of it in the Roman alphabet.

In recent times, cryptography has turned into a battleground of some of the world's best mathematicians and computer scientists. The ability to securely store and transfer sensitive information has proved a critical factor in success in war and business.

Because governments do not want certain entities in and out of their countries to have access to ways to receive and send hidden information that might be a threat to national interests, cryptography has been subject to various restrictions in many countries, ranging from limitations of the usage and export of software to the public dissemination of mathematical concepts that could be used to develop cryptosystems.

The internet has allowed the spread of powerful programs, however, and more importantly, the underlying techniques of cryptography, so that today many of the most advanced cryptosystems and ideas are now in the public domain.

This was last updated in March 2024

Continue Reading About cryptography

  • Where cloud cryptography fits in a security strategy
  • Must-have blockchain developer skills
  • Types of PKI certificates and their use cases

Related Terms

What is SSH (Secure Shell) and How Does It Work?
SSH (Secure Shell or Secure Socket Shell) is a network protocol that gives users -- particularly systems administrators -- a ...Seecompletedefinition
What is the Cybersecurity Information Sharing Act (CISA)?
The Cybersecurity Information Sharing Act (CISA) allows United States government agencies and non-government entities to share ...Seecompletedefinition
What is the Driver's Privacy Protection Act (DPPA)?
The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personally identifiable ...Seecompletedefinition

Dig Deeper on Data security and privacy

What is Cryptography? Definition from SearchSecurity (2024)

FAQs

What is the best definition of cryptography? ›

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it.

What is cryptology in simple words? ›

Cryptology is the science of secure communications. Cryptography creates messages with hidden meaning; cryptanalysis is the science of breaking those encrypted messages to recover their meaning.

What is cryptography in information theft? ›

Cryptography is an information security tactic used to protect enterprise information and communication from cyber threats through the use of codes.

What is the closest meaning of the phrase cryptography? ›

1. : secret writing. 2. : the enciphering and deciphering of messages in secret code or cipher. also : the computerized encoding and decoding of information.

What is cryptography for beginners? ›

Cryptography is the science of using mathematics to encrypt and decrypt data. Cryp- tography enables you to store sensitive information or transmit it across insecure net- works (like the Internet) so that it cannot be read by anyone except the intended recipient.

Why is it called cryptography? ›

The word "cryptography" is derived from the Greek kryptos, meaning hidden. The prefix "crypt-" means "hidden" or "vault," and the suffix "-graphy" stands for "writing." The origin of cryptography is usually dated from about 2000 B.C., with the Egyptian practice of hieroglyphics.

What is an example of a cryptology? ›

In classical cryptology the participants trust each other but not outsiders; typical examples include diplomatic communications and military commands. In business and personal transactions, though, the situation is almost the opposite, as the participants may have various motives for cheating.

What is the dictionary of cryptography? ›

Definitions: The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification.

Can someone steal my data? ›

The stolen data could be anything from online passwords, social security numbers, medical records, credit card numbers, bank account information, and so on. Data theft often occurs because cybercriminals want to either use the information for identity theft or sell it on the dark web.

What information do hackers need to steal your identity? ›

Scammers can use medical records, insurance policies, and health-related data for medical identity theft. Usernames and passwords. Hackers target your login credentials to gain unauthorized access to your accounts. Work logins and information.

What happens if your personal data is stolen? ›

If you're notified that your personal information was exposed in a data breach, act immediately to change your passwords, add a security alert to your credit reports and consider placing a security freeze on your credit reports.

What is cryptography in simple words? ›

Essentially, the word refers to the study of secure communications techniques, but cryptography is closely associated with encryption, or the act of scrambling ordinary text into what's known as ciphertext—and then back again into ordinary text (called plaintext) when it arrives at its destination.

What is another name for cryptography? ›

Until modern times, cryptography referred almost exclusively to "encryption", which is the process of converting ordinary information (called plaintext) into an unintelligible form (called ciphertext). Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.

What are the most common words in cryptography? ›

Short words provide useful clues. One-letter words are either a or I. The most common two-letter words are to, of, in, it, is, as, at, be, we, he, so, on, an, or, do, if, up, by, and my. The most common three-letter words are the, and, are,for, not, but, had, has, was, all, any, one, man, out, you, his, her, and can.

Which statement best describes cryptography? ›

Cryptography ensures the authentication and integrity of messages delivered over the control system. Evaluate the differences between stream and block ciphers and select the true statement.

What is the difference between encryption and cryptography? ›

Cryptography vs encryption: Cryptography is the science of concealing messages with a secret code. Encryption is the way to encrypt and decrypt data. The first is about studying methods to keep a message secret between two parties (like symmetric and asymmetric keys), and the second is about the process itself.

Is cryptography good or bad? ›

Confidentiality − Encryption technique can guard the information and communication from unauthorized revelation and access of information. Authentication − The cryptographic techniques such as MAC and digital signatures can protect information against spoofing and forgeries.

Top Articles
This Is What Your Credit Score Should Be to Buy a House
How I Invest in Bitcoin Cryptocurrency- A Basic Tutorial
7 C's of Communication | The Effective Communication Checklist
Main Moon Ilion Menu
Cars & Trucks - By Owner near Kissimmee, FL - craigslist
Wordscapes Level 5130 Answers
Katmoie
Ofw Pinoy Channel Su
Botanist Workbench Rs3
Obituary (Binghamton Press & Sun-Bulletin): Tully Area Historical Society
Best Transmission Service Margate
Best Theia Builds (Talent | Skill Order | Pairing + Pets) In Call of Dragons - AllClash
Riegler & Partner Holding GmbH auf LinkedIn: Wie schätzen Sie die Entwicklung der Wohnraumschaffung und Bauwirtschaft…
Mndot Road Closures
Snowflake Activity Congruent Triangles Answers
Oriellys St James Mn
Wunderground Huntington Beach
R/Altfeet
Skylar Vox Bra Size
Industry Talk: Im Gespräch mit den Machern von Magicseaweed
ocala cars & trucks - by owner - craigslist
Sivir Urf Runes
No Hard Feelings Showtimes Near Cinemark At Harlingen
Webcentral Cuny
Average Salary in Philippines in 2024 - Timeular
Vintage Stock Edmond Ok
U Of Arizona Phonebook
Aliciabibs
BJ 이름 찾는다 꼭 도와줘라 | 짤방 | 일베저장소
Sessional Dates U Of T
Meta Carevr
Evil Dead Rise Ending Explained
Barbie Showtimes Near Lucas Cinemas Albertville
Craigslistodessa
100 Million Naira In Dollars
Bursar.okstate.edu
Smayperu
Ixl Lausd Northwest
Beth Moore 2023
The Mad Merchant Wow
Retire Early Wsbtv.com Free Book
Finland’s Satanic Warmaster’s Werwolf Discusses His Projects
Latest Nigerian Music (Next 2020)
Uc Santa Cruz Events
Adam Bartley Net Worth
Why I’m Joining Flipboard
Shane Gillis’s Fall and Rise
R: Getting Help with R
Cabarrus County School Calendar 2024
Top 1,000 Girl Names for Your Baby Girl in 2024 | Pampers
bot .com Project by super soph
King Fields Mortuary
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6104

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.