Cryptography (nonfiction): Difference between revisions

From Gnomon Chronicles
Jump to navigation Jump to search
(Created page with "'''Cryptography''' (or '''cryptology'''; from Greek ''κρυπτός'' kryptós, "hidden, secret"; and ''γράφειν'' graphein, "writing", or ''-λογία'' -logia, "stud...")
 
No edit summary
 
(16 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Cryptography''' (or '''cryptology'''; from Greek ''κρυπτός'' kryptós, "hidden, secret"; and ''γράφειν'' graphein, "writing", or ''-λογία'' -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).
[[File:Crypto_de_la_buse.jpg|thumb|"Cryptogramme du Forban" trouvé à l'île Mahé. C'est un message chiffré, lancé dans la foule par le pirate La Buse montant au supplice, qui révélerait l'emplacement de ses trésors (Bibliothèque Nationale).]]'''Cryptography''' (or '''cryptology'''; from Greek ''κρυπτός'' kryptós, "hidden, secret"; and ''γράφειν'' graphein, "writing", or ''-λογία'' -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).
 
== Description ==


More generally, it is about constructing and analyzing protocols that block adversaries.
More generally, it is about constructing and analyzing protocols that block adversaries.


Cryptography is central to various aspects of [[information security (nonfiction)]], including:
Modern cryptography exists at the intersection of the disciplines of [[mathematics (nonfiction)|mathematics]], computer science, and electrical engineering.


* Data confidentiality
Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense.
* Data integrity
* Data authentication
* Data non-repudiation


Modern cryptography exists at the intersection of the disciplines of [[mathematics (nonfiction)]], computer science, and electrical engineering.
The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.


Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.


== Early cryptography ==
== In the News ==


Cryptography prior to the modern age was effectively synonymous with [[encryption (nonfiction)]], the conversion of information from a readable state to apparent nonsense.
<gallery>
File:Cryptographic numen modelled as nano-wire.jpg|link=Cryptographic numen|[[Cryptographic numen]] modelled in nanowire.
File:Public key cryptography.png|link=Public-key cryptography (nonfiction)|Diagram of [[Public-key cryptography (nonfiction)|public-key cryptography generation]] refuses to disclose private key.
</gallery>


The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.
== Fiction cross-reference ==


== Modern cryptography ==
* [[Cryptographic numen]] - a [[numen (nonfiction)]] arising from cryptography.
 
* [[Casio + N = CasiNo]]
Since World War I and the advent of the [[computer (nonfiction)]], the methods used to carry out cryptology have become increasingly complex and its application more widespread.
* [[Gnomon algorithm]]
 
* [[Gnomon Chronicles]]
Modern cryptography is heavily based on mathematical theory and computer science practice.
 
Cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary.


== Nonfiction cross-reference ==
== Nonfiction cross-reference ==


* [[Encryption (nonfiction)]]
* [[Alberti cipher (nonfiction)]]
* [[Information security (nonfiction)]]
* [[Mathematics (nonfiction)]]
* [[Mathematics (nonfiction)]]
* [[Oblivious transfer (nonfiction)]] - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred.
* [[Steganography (nonfiction)]]


== Fiction cross-reference ==
External links:


* [[Cryptographic numen]]
* [http://en.wikipedia.org/wiki/Cryptography Cryptography] @ Wikipedia
* [[Casio + N = CasiNo]]
* [https://www.coursera.org/learn/crypto Cryptography I] @ Coursera
* [https://boingboing.net/2019/09/10/rule-of-law-security.html Creating a "coercion resistant" communications system] @ Boing Boing - "... systems designers [should] contemplate ways to arbitrage both the rule of law and technical pre-commitments to make it harder for governments to force you to weaken the security of your product or compromise your users."


== External links ==
[[Category:Nonfiction (nonfiction)]]
 
[[Category:Cryptography (nonfiction)]]
* [http://wiki.karljones.com/Cryptography Cryptography] @ Wikipedia
* [http://en.wikipedia.org/wiki/Cryptography Cryptography] @ Wikipedia

Latest revision as of 05:29, 13 September 2019

"Cryptogramme du Forban" trouvé à l'île Mahé. C'est un message chiffré, lancé dans la foule par le pirate La Buse montant au supplice, qui révélerait l'emplacement de ses trésors (Bibliothèque Nationale).

Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

More generally, it is about constructing and analyzing protocols that block adversaries.

Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering.

Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense.

The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.

Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.

In the News

Fiction cross-reference

Nonfiction cross-reference

External links: