Cryptography
Adapted from Wikipedia · Discoverer experience
Cryptography, or cryptology, is the practice and study of techniques for secure communication even when others try to interfere. It involves creating and analyzing ways to keep messages private, ensuring that only the right people can read them. Today, cryptography combines ideas from mathematics, computer science, information security, and other fields to protect information.
Before modern times, cryptography mainly meant encryption—turning readable information into confusing text that only certain people could decode. With the invention of machines in World War II and the rise of computers, these methods grew more complex and found many uses, from online shopping to keeping passwords safe.
Modern cryptography relies heavily on mathematical theory and computer science. Special algorithms are designed to be extremely hard to break, using challenges that currently cannot be solved quickly even with powerful computers. While some systems can theoretically be broken, they are considered secure because doing so would take too much time and effort. This balance between security and practicality is what makes modern cryptography so important in our digital world.
Terminology
The word "cryptograph" was first used in the 19th century in a story by Edgar Allan Poe called "The Gold-Bug". The word comes from Greek, where "crypton" means hidden and "grapho" means to write.
Cryptography is about making messages secret. Encryption turns normal text, called plaintext, into secret text, called ciphertext. To read the secret text again, you need a key – a special secret word or number. There are two main types of systems: symmetric, where the same key locks and unlocks the message, and asymmetric, where a public key locks the message and a private key unlocks it. Asymmetric systems are often used to share a key safely before using a faster symmetric system.
History
Main article: History of cryptography
Cryptography is the practice of creating and studying ways to send secret messages. Long ago, people used simple tricks to hide what they were writing, like switching letters or moving them around. One famous example is the Caesar cipher, used by Julius Caesar, where he shifted each letter three places forward in the alphabet.
Over time, people invented more clever ways to hide messages, such as using special wheels or machines. During World War II, teams worked hard to break codes used by enemies, which helped lead to the creation of early computers. Today, cryptography is a big part of keeping information safe on the internet and in computers, using math to protect secrets.
Modern cryptography
Claude Shannon’s work in the mid-20th century laid the groundwork for modern cryptography. His research turned cryptography from an art into a science, using math to keep messages safe. Before this, cryptography focused mainly on language patterns, but now it uses many areas of mathematics, like number theory and information theory.
Today, cryptography helps protect all kinds of data, not just written words. Computers let us create more complex codes and hide information in any form, whether it’s text, pictures, or other data. New research also looks at how quantum physics might affect future security methods.
Symmetric-key cryptography
Symmetric-key cryptography uses the same key for both sending and receiving messages. This was the only type of encryption known until 1976. There are two main types: block ciphers, which process data in chunks, and stream ciphers, which create a continuous flow of key material. Examples include the Advanced Encryption Standard (AES) for block ciphers and RC4 for stream ciphers.
Public-key cryptography
Public-key cryptography uses two different keys: a public key that anyone can share and a private key that only the owner keeps. This makes it easier to manage keys in large networks. The idea was first suggested in 1976 by Whitfield Diffie and Martin Hellman. One common method is the RSA algorithm, developed by Ronald Rivest, Adi Shamir, and Len Adleman.
Cryptographic hash functions
Cryptographic hash functions turn any input into a fixed-length output, making it hard to guess the original data. They are used to verify data authenticity. Examples include SHA-1 and the newer SHA-2 family, with SHA-3 being developed to improve security further.
Cryptanalysis
Cryptanalysis is the study of finding weaknesses in cryptographic systems. While most methods can eventually be broken with enough effort, some, like the one-time pad, are considered unbreakable if used correctly. Attacks can come from different angles, such as analyzing ciphertext or exploiting mistakes in how encryption is used.
Cryptographic primitives
Cryptographic primitives are basic tools with specific security properties. They are used to build more complex systems, called cryptosystems, which provide functions like secure messaging or digital signatures.
Cryptosystems
Cryptosystems combine primitives to create secure functions. Examples include RSA for encryption and digital signatures, and systems for secure online payments. These systems often involve communication between multiple parties to ensure security.
Lightweight cryptography
Lightweight cryptography is designed for devices with limited power and processing ability, like those in the Internet of Things (IoT). Algorithms such as Ascon and SPECK are developed to meet these strict requirements while keeping data safe.
Applications
Main category: Applications of cryptography
Cryptography helps keep information safe on the internet. It is used to protect messages and data so that only the right people can read them. Many websites use special codes, called encryption, to keep information private. For example, when you visit a website that starts with "https://", it is using encryption to keep your data safe.
Cryptography is also important for keeping passwords secret. Instead of storing your password as it is, computers change it into a special code. This way, even if someone tries to look at the password, they cannot read it. Some computer programs also use encryption to protect all the data on a computer’s hard drive.
Cryptography plays a big role in cryptocurrency and new ways of managing money online. It helps make sure that only the right people can access and spend money. As technology grows, scientists are working on new ways to keep information safe even from very powerful computers called quantum computers.
Main article: Cybersecurity
Legal issues
See also: Cryptography laws in different nations
Cryptography has often been a topic of interest for intelligence and law enforcement agencies because secret communications can sometimes be involved in criminal or even treasonous activities. Because cryptography helps protect privacy, its use and control have led to many legal debates, especially since computers made strong cryptography widely available.
In some countries, using cryptography has been restricted. For example, until 1999, France had many rules limiting its use at home, but these have since loosened. Places like China and Iran still need special permission to use cryptography. The United States allows cryptography for domestic use but has had many debates about exporting it. In the past, the U.S. government controlled the export of cryptography closely because of its importance for national security. As the Internet grew, these rules relaxed, and today many people around the world use strong cryptography through everyday tools like web browsers and email programs.
Main article: Export of cryptography
Main article: Digital rights management
See also: Clipper chip
Main article: Key disclosure law
Images
This article is a child-friendly adaptation of the Wikipedia article on Cryptography, available under CC BY-SA 4.0.
Images from Wikimedia Commons. Tap any image to view credits and license.
Safekipedia