Cryptography Glossary
This glossary provides definitions for common terms used in the field of cryptography. Understanding these terms is crucial for grasping the concepts discussed throughout this website.
- Algorithm
- A precise sequence of instructions or a set of rules to be followed in calculations or other problem-solving operations, especially by a computer. In cryptography, an algorithm (or cipher) dictates how encryption and decryption are performed.
- Asymmetric Encryption (Public-Key Cryptography)
- A cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. Used for tasks like encryption and digital signatures.
- Authentication
- The process of verifying the identity of a user, device, or message. It ensures that a party is who or what it claims to be.
- Avalanche Effect
- A desirable property of cryptographic algorithms, where a small change in the input results in a significant change in the output. This is crucial for hashing functions.
- Block Cipher
- A type of symmetric encryption algorithm that encrypts a fixed-size block of data (e.g., 128 bits) at a time. Examples include AES and DES.
- Brute-Force Attack
- An attack method that involves systematically checking all possible keys or passwords until the correct one is found. The feasibility depends on the key length and available computing power.
- Caesar Cipher
- One of the simplest and most widely known encryption techniques. Each letter is replaced by a letter some fixed number of positions down the alphabet. Mentioned in our History of Cryptography.
- Cipher
- An algorithm for performing encryption or decryption. It's a set of steps used to transform plaintext into ciphertext and vice versa.
- Ciphertext
- The encrypted form of a message, rendered unreadable to unauthorized parties.
- Collision (Hash)
- In hashing functions, a collision occurs when two different inputs produce the same hash output. Strong hash functions are designed to be collision-resistant.
- Cryptanalysis
- The study of methods for obtaining the meaning of encrypted information without access to the secret key. Essentially, code breaking.
- Cryptography
- The practice and study of techniques for secure communication in the presence of third parties (adversaries). It encompasses methods for encryption, decryption, hashing, and digital signatures.
- Cryptographic Key (Key)
- A piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext.
- Data Integrity
- The assurance that digital information is uncorrupted and has not been altered. Hashing functions and digital signatures are key to maintaining data integrity.
- Decryption
- The process of converting ciphertext back into its original, readable form (plaintext) using a key.
- Digital Signature
- A mathematical scheme for verifying the authenticity of digital messages or documents. It provides authenticity, integrity, and non-repudiation. Explore more on our Digital Signatures page.
- Encryption
- The process of converting information or data (plaintext) into a code (ciphertext) to prevent unauthorized access.
- Hash Function
- A function that converts an input of arbitrary length into a fixed-size string of characters, which is the hash value. Cryptographic hash functions have specific properties like pre-image resistance and collision resistance.
- Key Exchange
- A method in cryptography by which cryptographic keys are exchanged between two parties. Diffie-Hellman is a common key exchange algorithm.
- Key Length (Key Size)
- The size of a cryptographic key, measured in bits. Longer keys generally provide stronger security against brute-force attacks.
- Non-Repudiation
- Assurance that someone cannot deny the validity of something. Digital signatures provide non-repudiation—the sender cannot deny having sent a message they signed.
- Plaintext
- The original, unencrypted message or data that is readable and understandable.
- Private Key
- In asymmetric cryptography, the secret key of a key pair kept confidential by its owner. Used for decryption or creating digital signatures.
- Public Key
- In asymmetric cryptography, the publicly available key of a key pair. Used for encryption or verifying digital signatures.
- Salt
- Random data used as an additional input to a one-way function that hashes data, typically a password. Salts defend against dictionary attacks and pre-computed rainbow table attacks.
- Stream Cipher
- A type of symmetric encryption algorithm that encrypts data one bit or byte at a time. Examples include RC4.
- Symmetric Encryption (Secret-Key Cryptography)
- A cryptographic system where the same key is used for both encryption and decryption. Read more on our Symmetric Encryption page.
This glossary is a starting point. The field of cryptography is vast and continually evolving, with new terms and concepts emerging regularly. Stay updated to ensure you have the latest cryptographic knowledge.