Difference between revisions of "Encryption"

From Glitchdata
Jump to navigation Jump to search
 
Line 10: Line 10:
  
  
== See also ==
+
==Related ==
{{Portal|Cryptography}}
+
* [[Security]]
* [[Substitution cipher]]
 
* [[Rotor machine|Rotor cipher machines]]
 
<!--* [[MicroTokenization]]-->
 
* [[Brute-force attack]]
 
* [[Cold boot attack]]
 
* [[Export of cryptography]]
 
* [[Cyberspace Electronic Security Act]] (in the US)
 
 
* [[Disk encryption]]
 
* [[Disk encryption]]
 
* [[Key management]]
 
* [[Key management]]
 
* [[Information-theoretic security#Physical layer encryption|Physical Layer Encryption]]
 
* [[Information-theoretic security#Physical layer encryption|Physical Layer Encryption]]
* [[Geo-Blocking]]
 
* [[Television encryption]]
 
* [[Active Defense|Active defense]]
 
 
==Further reading==
 
{{refbegin}}
 
* {{Citation | last = Fouché Gaines | first = Helen | author-link = Helen Fouché Gaines | title = Cryptanalysis: A Study of Ciphers and Their Solution | place = New York | publisher = Dover Publications Inc | year = 1939 | isbn = 978-0486200972 }}
 
* [[David Kahn (writer)|Kahn, David]], ''The Codebreakers - The Story of Secret Writing'' ({{ISBN|0-684-83130-9}}) (1967)
 
* [[Bart Preneel|Preneel, Bart]], "Advances in Cryptology — EUROCRYPT 2000", Springer Berlin Heidelberg, 2000, {{ISBN|978-3-540-67517-4}}
 
* [[Abraham Sinkov|Sinkov, Abraham]], ''Elementary Cryptanalysis: A Mathematical Approach'', Mathematical Association of America, 1966. {{ISBN|0-88385-622-0}}
 
{{refend}}
 
  
  
 
[[Category:Cryptography]]
 
[[Category:Cryptography]]
 
[[Category:Encryption]]
 
[[Category:Encryption]]
 +
[[Category:Security]]

Latest revision as of 00:56, 12 June 2019

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.



Related