{"title":"Overview of Cryptography","authors":"B. U. Archana, V. Niranjana","doi":"10.46632/daai/3/2/15","DOIUrl":null,"url":null,"abstract":"Until very recently, the term \"cryptography\" was almost always used to refer to \"encryption,\" which is the act of transforming plaintext or conventional information into an unintelligible form (called cipher text). Decryption is the opposite, or the process of returning plaintext from the unintelligible cipher text. The encryption and reversing decryption operations are carried out by a pair of algorithms known as cyphers (or cyphers). The algorithm and, in each case, a \"key\" work together just to regulate the precise operation of a cypher. The key, which is required to decrypt the cipher text, is a secret that should ideally only be known by the communicants. It typically takes the form of a short string of characters that the user can remember. A \"cryptosystem\" is the ordered list of elements with a finite number of potential combinations in formal mathematics.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Data Analytics and Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46632/daai/3/2/15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Until very recently, the term "cryptography" was almost always used to refer to "encryption," which is the act of transforming plaintext or conventional information into an unintelligible form (called cipher text). Decryption is the opposite, or the process of returning plaintext from the unintelligible cipher text. The encryption and reversing decryption operations are carried out by a pair of algorithms known as cyphers (or cyphers). The algorithm and, in each case, a "key" work together just to regulate the precise operation of a cypher. The key, which is required to decrypt the cipher text, is a secret that should ideally only be known by the communicants. It typically takes the form of a short string of characters that the user can remember. A "cryptosystem" is the ordered list of elements with a finite number of potential combinations in formal mathematics.