Cryptography Reference
In-Depth Information
“cryptography” has a wider sense, being defined as the science of information
protection against unauthorized parties by preventing unauthorized alteration of
use. Cryptographic algorithms are the mathematical algorithms which enforce
protection.
Cipher
: (formally) secret code, enabling the expression of a public code by a
secret one by making the related information confidential. This definition is
different from the one in RFC 2828, namely, “a cryptographic algorithm for
encryption and decryption.”
Cryptographic system
: set of cryptographic algorithms which include ciphers
and other cryptographic schemes.
Cryptosystem
: an abbreviation of “cryptographic system” which is not recom-
mended in RFC 2828. It is mostly used for “public-key cryptosystem”
2
in which
case it is a set of cryptographic algorithms that include algorithms for key pair
generation, encryption, and decryption. It is also (improperly) used as a synonym
of “cipher.” Cipher is mostly used for symmetric key techniques.
3
Cleartext
: information encoded by using a public code, i.e. available “in clear.”
Plaintext
: input of an encryption algorithm (usually, a cleartext).
Ciphertext, cryptogram
: information encoded by a cryptographic system.
Encryption, encipherment, decryption, decipherment
: basic cryptographic pro-
cesses: action to transform a plaintext into a ciphertext or the opposite. Note
that purists make a subtle difference between decryption and decipherment as
detailed below.
Decryption
(for purists): action to transform a ciphertext into a plaintext by an
unauthorized party.
Decipherment
(for purists): action to transform a ciphertext into a plaintext by
an authorized party.
Cryptanalysis, cryptographic analysis, cryptoanalysis
: theory of security anal-
ysis of cryptographic systems. Usually, this term is used in a negative way: for
the insecurity analysis (by breaking the security of systems). This is a little mis-
leading since this can also be used in a positive way: for security certification
(by formal proof or reduction to problems which are known to be hard but not
yet proven to be so).
4
Breaking a cryptosystem
: proving the insecurity of a cryptosystem, for instance
by exhibiting how to decrypt a message.
Cryptology
: science of cryptography and cryptanalysis (sometimes also
steganography). Purists thus distinguish “cryptography” from its superset “cryp-
tology.” (The title of the present textbook may thus be a little misleading.)
Steganography
: science of information hiding. Here we do not want to protect
the secrecy of an information only, we also want to make sure that any unau-
thorized party has no evidence that the information even exists (for instance, by
watermarking).
2
See Chapter 9.
3
See Chapter 2.
4
See, e.g., Chapter 4.
Search WWH ::
Custom Search