Category: 

What Is Cryptography?

Cryptography helps ensure a secure transmission of information.
Https at the beginning of a URL means the site is secure.
Article Details
  • Written By: Dan Blacharski
  • Edited By: L. S. Wynn
  • Last Modified Date: 30 March 2014
  • Copyright Protected:
    2003-2014
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
A jellyfish tentacle can still sting even if it has been separated from the jellyfish’s body.  more...

April 22 ,  1889 :  The Oklahoma Land Rush began.  more...

Everyone has secrets, and some have more than others. When it becomes necessary to transmit those secrets from one point to another, it's important to protect the information while it's in transit. Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination.

Predating computers by thousands of years, cryptography has its roots in basic transposition ciphers, which assign each letter of the alphabet a particular value. A simple example is to assign each letter a progressively higher number, where A=1, B=2, and so forth. Using this formula for example, the word "wiseGEEK", once encrypted, would read "23 9 19 5 7 5 5 11". During World War Two, machines were invented that made the ciphers more complicated and difficult to break, and today, computers have made them even stronger still.

The Secure Sockets Layer (SSL) is a common encryption protocol used in e-commerce. When someone makes a purchase over the Internet, this is the technology the merchant uses to make sure that the buyer can safely transmit his credit card information. Using this protocol, the computer and the online merchant's computer agree to create a type of private "tunnel" through the public Internet. This process is called the "handshake." When a URL in a Web browser starts with "https" instead of "http," it is a secure connection that is using SSL.

Ad

Some methods of cryptography use a "secret key" to allow the recipient to decrypt the message. The most common secret key cryptosystem is the Data Encryption Standard (DES), or the more secure Triple-DES, which encrypts the data three times.

More common are systems that use a public key system, such as the Diffie-Hellman key agreement protocol. This system uses two keys that work together: a public one, which anyone can access, and a private one, which is kept secret by the party receiving the data. When a person wants to send a secure message to someone else, the person encrypts that message using the recipient's public key. Once encrypted, the recipient must use his or her private key to decrypt it.

The goal of cryptography extends beyond merely making data unreadable; it also extends into user authentication, which is providing the recipient with assurance that the encrypted message originated from a trusted source. Hash functions are sometimes used in conjunction with private key or public key systems. This is a type of one-way encryption, which applies an algorithm to a message, such that the message itself cannot be recovered. Unlike key-based cryptography, the goal of the hash function is not to encrypt data for later decryption, but to create a sort of digital fingerprint of a message. The value derived from applying the hash function can be re-calculated at the receiving end, to ensure that the message has not been tampered with during transit. Then, a key-based system is applied to decipher the message.

The study of this field is advancing steadily, and scientists are rapidly creating mechanisms that are more difficult to break. The most secure type yet may be quantum cryptography, a method that has not yet been perfected. Instead of using a key, it relies on the basic laws of physics and the movement and orientation of photons to establish a connection that is absolutely secure and unbreakable.

Ad

Discuss this Article

anon350910
Post 10

This sounds very hard and easy at the same time. How do I become one?

anon141678
Post 7

It is also interesting to think, that all the cryptographic methods used throughout the entire history of the human use of this skill, become obsolete and useless once they have been solved or made public. Because of this, everything that was ever encrypted before in the history of the human race, is now easily and quickly decipherable using our advanced programming technologies along with the latest in high speed computing power, provided you have access to enough of that computing power.

I wonder how long 256 bit encryption technologies have been broken, by whom, and for what -- and I'm sure it's still an exclusive club. Mfs Energy.

anon108503
Post 6

A tough field, but i like it!

anon99930
Post 5

It's greatly helpful. thank you.

anon74651
Post 3

Greatness lies in exploring the world you live into, along with the capability to manage its existence. So a great, new field has emerged.

anon68328
Post 2

i am feeling very proud to be a communication engineer.

leilani
Post 1

This sounds like a rather complicated field!

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email