Symmetric encryption, also referred to as conventional
encryption or
single-key
encryption, was the only type of encryption in use prior to the
development of public-key encryption in the 1970s. It remains by far the most
widely used of the two types of encryption. Part One examines a number of
symmetric ciphers. In this chapter, we begin with a look at a general model for
the symmetric encryption process; this will enable us to understand the context
within which the algorithms are used. Next, we examine a variety of algorithms
in use before the computer era. Finally, we look briefly at a different approach
known as steganography.
Chapter 3
examines the most widely used symmetric cipher: DES.
Before beginning, we define some terms. An original message is
known as the
plaintext, while the coded message is
called the
ciphertext. The process of converting from
plaintext to ciphertext is known as
enciphering or
encryption; restoring the plaintext from the
ciphertext is
deciphering or
decryption. The many schemes used for
encryption constitute the area of study known as
cryptography. Such a scheme
is
known as a
cryptographic system or a
cipher. Techniques used for
deciphering a message without any knowledge of the enciphering details fall into
the area of
cryptanalysis. Cryptanalysis is what the
layperson calls "breaking the code." The areas of cryptography and cryptanalysis
together are called
cryptology
No comments:
Post a Comment