What is a Cipher
by Kang Ricky on Nov.22, 2009, under Cryptography
a cipher (or cypher) is an algorithm for performing encryption or decryption — a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. In non-technical usage, a “cipher” is the same thing as a “code”; however, the concepts are distinct in cryptography. In classical cryptography, ciphers were distinguished from codes. Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, “UQJHSE” could be the code for “Proceed to the following coordinates”. When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it; it should resemble random gibberish to those not intended to read it.
The operation of a cipher usually depends on a piece of auxiliary information, called a key or, in traditional NSA parlance, a cryptovariable. The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without knowledge of the key, it should be difficult, if not nearly impossible, to decrypt the resulting ciphertext into readable plaintext.
Most modern ciphers can be categorized in several ways
* By whether they work on blocks of symbols usually of a fixed size (block ciphers), or on a continuous stream of symbols (stream ciphers).
* By whether the same key is used for both encryption and decryption (symmetric key algorithms), or if a different key is used for each (asymmetric key algorithms). If the algorithm is symmetric, the key must be known to the recipient and sender and to no one else. If the algorithm is an asymmetric one, the enciphering key is different from, but closely related to, the deciphering key. If one key cannot be deduced from the other, the asymmetric key algorithm has the public/private key property and one of the keys may be made public without loss of confidentiality.
more info:click here
Infolinks In Text Ads
Search Now
Need Translete
Blog Archive
Labels
Add Url
(1)
Affiliate
(4)
Aplikasi Mobile
(1)
Bisnis Gratis Facebook
(1)
Bisnis Internet di Rumah
(3)
Bisnis Online
(1)
Blogging
(8)
Cara membuat Webiste
(1)
Cryptography
(5)
Cyber
(4)
Domain
(5)
E-ECOMMERCE
(4)
E-PAYMENT
(4)
Facebook
(3)
Forex
(1)
Fraud | Confidence tricks | Deception
(2)
Free Credits cards.
(1)
Free Domain
(1)
Free Hosting
(1)
Free Money Online
(3)
Free Submit Url
(1)
Free Website Builder
(1)
free wigdets
(2)
Game Facebook
(1)
google adword
(1)
Google Analytics
(1)
Hack
(2)
Handphone
(4)
Hosting
(3)
Internet
(17)
Jaringan
(1)
jaringan nirkabel
(4)
Komputer
(2)
Make Money Online
(1)
Marketing
(1)
Marketplace
(1)
Mobile
(2)
Modem
(1)
paypal
(10)
PPC
(1)
PTR
(3)
SEO
(5)
Software
(2)
Tips blog
(7)
Tips Domain
(1)
Tips Facebook
(5)
Tips Mempercantik blog
(2)
Tips Mobile
(2)
Tips Twitter
(6)
Torrent
(2)
Trojans
(1)
Tutorial Twitter
(1)
VCC (Virtual Credit Card)
(1)
0 komentar