Cyber Security:
Cryptography
Cryptography has been used throughout history. Julius Caesar used simple ciphers to send military orders to his generals, whereas more sophisticated medieval ciphers were used that withstood decryption until the late ninteenth century. More recently there is the famous Enigma codes of the Second World War.
Cryptography is underpinned by mathematics. Letters and numbers have to be manipulated in a reproducible way so that the message can be decrypted by the receiver - reversing the process. There are two types: symmetric and asymmetric.
The recent development of computers has allowed for far more complex means of encryption to be employed than was possible before.
Any data that can be represented in binary format, i.e. using 0s and 1s, can be encrypted by a computer.
Cryptography isn't just used to hide secrets, it can also be used to authenticate data sent on an insecure network – such as the internet. See hashing.
Computers can:
easily perform the necessary mathematical operations
employ more complex mathematics than could be reasonably expected of a human
encrypt and decrypt at a much faster rate than a human
handle complex and long messages - a large amount of data
Common applications for cryptography include:
secure banking and payments systems – cryptography ensures your money is safe when it is transferred between accounts, issued at ATMs or used to shop online
protecting privacy of conversations made over mobile telephones
safeguarding wireless networks that give access to the internet
securing files on hard disks and memory sticks
authenticating electronic documents
electronic voting
securing media files such as music or movies from piracy, where it is known as Digital Rights Management (DRM).
Terminology in cryptography
plaintext – information that can be directly read by humans or a machine. Plaintext is a historic term pre-dating computers, when encryption was only used for hardcopy text, nowadays it is associated with many formats including music, movies and computer programs
ciphertext – the encrypted data
a cipher – the mathematics (or algorithm) responsible for turning plaintext into ciphertext and reverting ciphertext to plaintext. It is sometimes called ‘code’ – there is a technical difference between the two but they are used interchangably except by experts.
encryption – the process of converting plaintext to ciphertext (occasionally you may see it called ‘encipherment’).
decryption – the process of reverting ciphertext to plaintext (occasionally ‘decipherment’).
keys - pieces of information that determine the output from an encryption (or decryption) process.
Pages related to this topic:
Symmetric Cryptography
Asymmetric Cryptography
Cryptography in Action
Cryptography Standards