cryptography

last edited Mon, 23 Sep 2024 04:23:25 GMT
backlinks: null


the science of secrecy is largely a secret science

While authentication keys tend to expire once changed or during single use, decryption keys can remain detrimental to security due to their persistent value in decrypting ciphertext corresponding to those exact keys.[1] In other words, as long as ciphertext is widely available, access to its corresponding decryption key is a security risk. authenticity and confidentiality are different concepts.

Ciphers direct link to this section

Ciphers are broken in secret, opponents will not announce. Using one type of Cipher is allowing a single point of failure because we cannot measure cipher strength. [2]

Block Cipher direct link to this section

Stream Cipher direct link to this section

Often described as a symmetric encryption algorithm such that:

One-Time Pad direct link to this section

Also known as Vernam-cipher, messages are encrypted with randomized data. For a 5 letter text, the possibilities to brute force would be 26^5. The security of OTP relies on randomless of the key. Despite being broken in other applications before, it is said to be unbreakable (officially). If any of the following rules are broken then OTP is no longer unbreakable. [3] OTP is said to have perfect secrecy

Hash Functions direct link to this section

Curve direct link to this section


  1. Wikileaking a Cryptography Lesson ↩︎

  2. Ritter's Crypto Glossary and Dictionary of Technical Cryptography ↩︎

  3. Cipher Machines and Cryptology ↩︎