Cryptography (nonfiction): Difference between revisions

From Gnomon Chronicles
Jump to navigation Jump to search
No edit summary
No edit summary
 
(11 intermediate revisions by the same user not shown)
Line 9: Line 9:
The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.
The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.


Since World War I and the advent of the [[computer (nonfiction)|computer]], the methods used to carry out cryptology have become increasingly complex and its application more widespread.
Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.


== Fiction cross-reference ==
== In the News ==


<gallery mode="traditional">
<gallery>
File:Cryptographic numen modelled as nano-wire.jpg|link=Cryptographic numen|[[Cryptographic numen]] modelled in nanowire.
File:Cryptographic numen modelled as nano-wire.jpg|link=Cryptographic numen|[[Cryptographic numen]] modelled in nanowire.
File:Public key cryptography.png|link=Public-key cryptography (nonfiction)|Diagram of [[Public-key cryptography (nonfiction)|public-key cryptography generation]] refuses to disclose private key.
</gallery>
</gallery>


* [[Cryptographic numen]]
== Fiction cross-reference ==
 
* [[Cryptographic numen]] - a [[numen (nonfiction)]] arising from cryptography.
* [[Casio + N = CasiNo]]
* [[Casio + N = CasiNo]]
* [[Gnomon algorithm]]
* [[Gnomon Chronicles]]


== Nonfiction cross-reference ==
== Nonfiction cross-reference ==


* [[Alberti cipher (nonfiction)]]
* [[Mathematics (nonfiction)]]
* [[Mathematics (nonfiction)]]
* [[Oblivious transfer (nonfiction)]] - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred.
* [[Steganography (nonfiction)]]


== External links ==
External links:


* [http://wiki.karljones.com/Cryptography Cryptography] @ Wikipedia
* [http://en.wikipedia.org/wiki/Cryptography Cryptography] @ Wikipedia
* [http://en.wikipedia.org/wiki/Cryptography Cryptography] @ Wikipedia
* [https://www.coursera.org/learn/crypto Cryptography I] @ Coursera
* [https://boingboing.net/2019/09/10/rule-of-law-security.html Creating a "coercion resistant" communications system] @ Boing Boing - "... systems designers [should] contemplate ways to arbitrage both the rule of law and technical pre-commitments to make it harder for governments to force you to weaken the security of your product or compromise your users."


[[Category:Nonfiction (nonfiction)]]
[[Category:Cryptography (nonfiction)]]
[[Category:Cryptography (nonfiction)]]

Latest revision as of 05:29, 13 September 2019

"Cryptogramme du Forban" trouvé à l'île Mahé. C'est un message chiffré, lancé dans la foule par le pirate La Buse montant au supplice, qui révélerait l'emplacement de ses trésors (Bibliothèque Nationale).

Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

More generally, it is about constructing and analyzing protocols that block adversaries.

Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering.

Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense.

The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.

Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.

In the News

Fiction cross-reference

Nonfiction cross-reference

External links: