Cryptography (nonfiction): Difference between revisions

From Gnomon Chronicles
Jump to navigation Jump to search
No edit summary
No edit summary
Line 13: Line 13:
== In the News ==
== In the News ==


<gallery mode="traditional">
<gallery>
File:Cryptographic numen modelled as nano-wire.jpg|link=Cryptographic numen|[[Cryptographic numen]] modelled in nanowire.
File:Cryptographic numen modelled as nano-wire.jpg|link=Cryptographic numen|[[Cryptographic numen]] modelled in nanowire.
File:Public key cryptography.png|link=Public-key cryptography (nonfiction)|Diagram of [[Public-key cryptography (nonfiction)|public-key cryptography generation]] refuses to disclose private key.
File:Public key cryptography.png|link=Public-key cryptography (nonfiction)|Diagram of [[Public-key cryptography (nonfiction)|public-key cryptography generation]] refuses to disclose private key.
Line 26: Line 26:


* [[Mathematics (nonfiction)]]
* [[Mathematics (nonfiction)]]
* [[Oblivious transfer (nonfiction)]] - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred.


External links:
External links:

Revision as of 20:42, 9 April 2018

"Cryptogramme du Forban" trouvé à l'île Mahé. C'est un message chiffré, lancé dans la foule par le pirate La Buse montant au supplice, qui révélerait l'emplacement de ses trésors (Bibliothèque Nationale).

Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

More generally, it is about constructing and analyzing protocols that block adversaries.

Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering.

Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense.

The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.

Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.

In the News

Fiction cross-reference

Nonfiction cross-reference

External links: