Cryptography (nonfiction): Difference between revisions
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
Since World War I and the advent of the [[computer (nonfiction)|computer]], the methods used to carry out cryptology have become increasingly complex and its application more widespread. | Since World War I and the advent of the [[computer (nonfiction)|computer]], the methods used to carry out cryptology have become increasingly complex and its application more widespread. | ||
== | == In the News == | ||
<gallery mode="traditional"> | <gallery mode="traditional"> | ||
File:Cryptographic numen modelled as nano-wire.jpg|link=Cryptographic numen|[[Cryptographic numen]] modelled in nanowire. | File:Cryptographic numen modelled as nano-wire.jpg|link=Cryptographic numen|[[Cryptographic numen]] modelled in nanowire. | ||
</gallery> | </gallery> | ||
== Fiction cross-reference == | |||
* [[Cryptographic numen]] | * [[Cryptographic numen]] | ||
Line 24: | Line 26: | ||
* [[Mathematics (nonfiction)]] | * [[Mathematics (nonfiction)]] | ||
External links: | |||
* [http://wiki.karljones.com/Cryptography Cryptography] @ Wikipedia | * [http://wiki.karljones.com/Cryptography Cryptography] @ Wikipedia |
Revision as of 11:46, 24 June 2016
Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).
More generally, it is about constructing and analyzing protocols that block adversaries.
Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering.
Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense.
The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons from doing the same.
Since World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.
In the News
Cryptographic numen modelled in nanowire.
Fiction cross-reference
Nonfiction cross-reference
External links:
- Cryptography @ Wikipedia
- Cryptography @ Wikipedia