AI/TLDRai-tldr.devPOMEGRApomegra.io · AI stock market analysis - autonomous investment agents

Intro to Cryptography

Secure Communication for the Digital Age

Cryptography Glossary

This glossary provides definitions for common terms used in the field of cryptography. Understanding these terms is crucial for grasping the concepts discussed throughout this website.

Abstract image representing a collection of terms
Algorithm
A precise sequence of instructions or a set of rules to be followed in calculations or other problem-solving operations, especially by a computer. In cryptography, an algorithm (or cipher) dictates how encryption and decryption are performed.
Asymmetric Encryption (Public-Key Cryptography)
A cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. Used for tasks like encryption and digital signatures.
Authentication
The process of verifying the identity of a user, device, or message. It ensures that a party is who or what it claims to be.
Avalanche Effect
A desirable property of cryptographic algorithms, where a small change in the input results in a significant change in the output. This is crucial for hashing functions.
Block Cipher
A type of symmetric encryption algorithm that encrypts a fixed-size block of data (e.g., 128 bits) at a time. Examples include AES and DES.
Brute-Force Attack
An attack method that involves systematically checking all possible keys or passwords until the correct one is found. The feasibility depends on the key length and available computing power.
Caesar Cipher
One of the simplest and most widely known encryption techniques. Each letter is replaced by a letter some fixed number of positions down the alphabet. Mentioned in our History of Cryptography.
Cipher
An algorithm for performing encryption or decryption. It's a set of steps used to transform plaintext into ciphertext and vice versa.
Ciphertext
The encrypted form of a message, rendered unreadable to unauthorized parties.
Collision (Hash)
In hashing functions, a collision occurs when two different inputs produce the same hash output. Strong hash functions are designed to be collision-resistant.
Cryptanalysis
The study of methods for obtaining the meaning of encrypted information without access to the secret key. Essentially, code breaking.
Cryptography
The practice and study of techniques for secure communication in the presence of third parties (adversaries). It encompasses methods for encryption, decryption, hashing, and digital signatures.
Cryptographic Key (Key)
A piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext.
Data Integrity
The assurance that digital information is uncorrupted and has not been altered. Hashing functions and digital signatures are key to maintaining data integrity.
Decryption
The process of converting ciphertext back into its original, readable form (plaintext) using a key.
Digital Signature
A mathematical scheme for verifying the authenticity of digital messages or documents. It provides authenticity, integrity, and non-repudiation. Explore more on our Digital Signatures page.
Encryption
The process of converting information or data (plaintext) into a code (ciphertext) to prevent unauthorized access.
Hash Function
A function that converts an input of arbitrary length into a fixed-size string of characters, which is the hash value. Cryptographic hash functions have specific properties like pre-image resistance and collision resistance.
Key Exchange
A method in cryptography by which cryptographic keys are exchanged between two parties. Diffie-Hellman is a common key exchange algorithm.
Key Length (Key Size)
The size of a cryptographic key, measured in bits. Longer keys generally provide stronger security against brute-force attacks.
Non-Repudiation
Assurance that someone cannot deny the validity of something. Digital signatures provide non-repudiation—the sender cannot deny having sent a message they signed.
Plaintext
The original, unencrypted message or data that is readable and understandable.
Private Key
In asymmetric cryptography, the secret key of a key pair kept confidential by its owner. Used for decryption or creating digital signatures.
Public Key
In asymmetric cryptography, the publicly available key of a key pair. Used for encryption or verifying digital signatures.
Salt
Random data used as an additional input to a one-way function that hashes data, typically a password. Salts defend against dictionary attacks and pre-computed rainbow table attacks.
Stream Cipher
A type of symmetric encryption algorithm that encrypts data one bit or byte at a time. Examples include RC4.
Symmetric Encryption (Secret-Key Cryptography)
A cryptographic system where the same key is used for both encryption and decryption. Read more on our Symmetric Encryption page.
Collection of cryptographic symbols

This glossary is a starting point. The field of cryptography is vast and continually evolving, with new terms and concepts emerging regularly. Stay updated to ensure you have the latest cryptographic knowledge.