What is Encryption: Definition and 63 Discussions

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.
For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.
Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often utilized in military messaging. Since then, new techniques have emerged and become commonplace in all areas of modern computing. Modern encryption schemes utilize the concepts of public-key and symmetric-key. Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.

View More On Wikipedia.org
  1. Greg Bernhardt

    'Unbreakable' encryption introduced

    I think this is the perfect place to discuss the possibilities of quantum cryptography. It seems to have become a reality now. Let's discuss whether this truly is unbreakable! We've heard it before, but is it different this time? http://news.bbc.co.uk/1/hi/sci/tech/7661311.stm
  2. K

    Encryption v.s. quantum computers

    Hi I've been hearing for years now that quantum computers have the potential to render encryption obsolete. My layman's understanding is that it would do this by taking advantage of the fact that qbits can exist in multiple states not just zero and one. I imagine there must be some limit to...
  3. Q

    Why Aren't 128 Bit Public Keys Used for Encryption on the Internet?

    I was wondering about this: http://www.andya.org.uk/jsplay/codeworks.html So if banks use 128 bit public keys as and a 512 bit public key was crackable in less then 24 hours, then a 128 bit public key must be exponentially easier to crack so how come hackers never go after that?
  4. N

    Alternative science: Action at Distance, Quantum Encryption andCorollaries

    Here are my thoughts on the paradoxal experiment where information seems to travel at infinite speed between two photons correlated at their origin. In this experiment, two photons with correlated k-vectors (through momentum conservation) and polarization (through the relative angle of the two...
  5. J

    I'll let you know how this turns out. Wish me luck!

    do-it-yourself encryption Really don't know where to put this, so thought I'd ask all the fine folks here and see if I get a response. One of the curses of being widely read is that sometimes you remember the subject but neither content nor location of something you read once and would really...
  6. J

    Encryption Q: XOR of Data w/Secret Key & Compression

    I hope this is the right place to ask this: So looking at a symmetric encryption scheme, we see that a simple, say, xor of the data with the secret key will be broken in the event of single known-plaintext attack. Obviously, then, it is intuitive to pad out all plaintext with a random value...
  7. murshid_islam

    How to Use Huffman Code for Encryption?

    hi can anyone help me with this? i need some materials on encryption using huffman code. is there something useful in the internet? can anyone suggest some link. thanks in advance to anyone who can help.
  8. S

    Is This Encryption Just an Alphabet Shift?

    mszwt~HsjFs0xysysoFo4MCF4GInp~oE4sBnwMDEnCB0fBr0DCI0hoBytH~Duszw4wH0jwHsjF Can anyone figure out this encryption?
  9. hitssquad

    Duncan's encryption uncrackable?

    kare11.com/news/news_article.aspx?storyid=104357
  10. M

    Encryption Fiction: Measuring Security & Substitution Algorithms

    I need to know how to measure the security of an encryption algorithm. I have no idea how code breakers do their job so I cannot rate an innovative algorithm. Also, does a substitution algorithm like the enigma used to work exist?
  11. M

    Is DES Still Relevant in Modern Cryptography?

    Im doing a project on the data encryption standard (DES), and was wondering if anyone had any ideas on where to find papers that discuss the mathematics behind the system. thanks
  12. D

    Decoding encryption with matrices

    http://www.sosmath.com/matrix/coding/coding.html How would you decode the encryption at the bottom of the page?
  13. Z

    RSA Encryption: Finding Primes to Make Decryption Difficult

    I'm working on encrypting a small message using RSA. Are there any types of primes or primes of particular property that would make RSA decryption particularly difficult? Furthermore are there any better ways that just randomly trying to factorise to break RSA encryption or is there some...
Back
Top