Cypher: Difference between revisions
from redirect to substantive page |
mNo edit summary |
||
Line 4: | Line 4: | ||
A cypher is used to turn the original information ("[[plaintext]]") to the encrypted form "[[cyphertext]]". The cyphertext message contains all the information of the plaintext message, but cannot be read by human or computer without the proper mechanism to decrypt it. |
A cypher is used to turn the original information ("[[plaintext]]") to the encrypted form "[[cyphertext]]". The cyphertext message contains all the information of the plaintext message, but cannot be read by human or computer without the proper mechanism to decrypt it. |
||
To encypher or decypher, you need the "key". In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. |
To encypher or decypher, you need the "[[key (cryptography)|key]]". In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. |
||
By type of key used ciphers are divided into: |
By type of key used ciphers are divided into: |
Revision as of 17:36, 5 March 2014
A cypher (or cipher) is an algorithm for performing encryption (coding) or decryption (decoding). It is a series of well-defined steps that can be followed as a procedure. To encipher or encode is to convert information from plain text into cypher or code. In non-technical usage, a 'cypher' is the same thing as a 'code'; but in cryptography, cyphers are distinguished from codes.[1]
Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the following coordinates".
A cypher is used to turn the original information ("plaintext") to the encrypted form "cyphertext". The cyphertext message contains all the information of the plaintext message, but cannot be read by human or computer without the proper mechanism to decrypt it. To encypher or decypher, you need the "key". In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption.
By type of key used ciphers are divided into:
- symmetric key algorithms (private-key cryptography): the same key is used for encryption and decryption, and
- asymmetric key algorithms (public-key cryptography): two different keys are used for encryption and decryption.
References
- ↑ Kahn, David 1967. The Codebreakers – the story of secret writing. ISBN 0-684-83130-9