This is a code i made up one day. Everything is the oposite. Example; A=z.
:''This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see [[cryptography]]. For the movie, see [[Encrypt (film)]].''
the key!
In [[cryptography]], '''encryption''' is the process of obscuring [[information]] to make it unreadable without special knowledge. While encryption has been used to protect communications for centuries, only organizations and individuals with an extraordinary need for secrecy had made use of it. In the mid-1970s, strong encryption emerged from the sole preserve of secretive government agencies into the public ___domain, and is now employed in protecting widely-used systems, such as Internet [[e-commerce]], [[mobile telephone]] networks and bank [[automatic teller machine]]s.
ABCDEFGHIJKLMNOPQRSTUVWXYZ123456789=
Encryption can be used to ensure secrecy, but other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message; for example, a [[message authentication code]] (MAC) or [[digital signature]]s. Another consideration is protection against [[traffic analysis]].
987654321zyxwvutsrqponmlkjihgfedcba
Encryption or software [[code obfuscation]] is also used in software [[copy protection]] against [[reverse engineering]], unauthorized application analysis, cracks and software piracy used in different encryption or [[obfuscating software]]
== Ciphers ==
A '''cipher''' is an [[algorithm]] for performing [[encryption]] (and the reverse, '''decryption''') — a series of well-defined steps that can be followed as a procedure. An alternative term is '''encipherment'''.
The original information is known as ''[[plaintext]]'', and the encrypted form as '''ciphertext'''. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it; it should resemble random gibberish to those not intended to read it.
The operation of a cipher usually depends on a piece of auxiliary information, called a [[key (cryptography)|key]] or, in traditional [[NSA]] parlance, a '''cryptovariable.''' The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without the same key, it should be difficult, if not impossible, to decrypt the resulting ciphertext into readable plaintext.
"Cipher" is alternatively spelled "cypher"; similarly "ciphertext" and "cyphertext", and so forth. The word descends from the [[Arabic language|Arabic]] word for zero: ''{{IPA|ṣ}}ifr'' or صِفْر, like (the Italian) ''zero'' (which remained in use for 0, the crucial innovation in positional Arabic versus Roman numerals) but soon was used for any decimal digit, even any number. While it may have come to mean encoding because that often involved numbers, a theory says conservative Catholic opponents of the Arabic (heathen) numerals equated it with any 'dark secret'.
== Ciphers versus codes ==
: ''Main article: [[Code (cryptography)]]''
In non-technical usage, a "(secret) [[code (cryptography)|code]]" is the same thing as a cipher. Within technical discussions, however, they are distinguished into two concepts. Codes work at the level of meaning — that is, words or phrases are converted into something else. Ciphers, on the other hand, work at a lower level: the level of individual letters, small groups of letters, or, in modern schemes, individual bits. Some systems used both codes and ciphers in one system, using [[superencipherment]] to increase the security.
Historically, cryptography was split into a dichotomy of codes and ciphers, and coding had its own terminology, analogous to that for ciphers: "''encoding'', ''codetext'', ''decoding''" and so on. However, codes have a variety of drawbacks, including susceptibility to [[cryptanalysis]] and the difficulty of managing a cumbersome [[codebook]]. Because of this, codes have fallen into disuse in modern cryptography, and ciphers are the dominant technique.
== Types of cipher ==
There are a variety of different types of encryption. Algorithms used earlier in the [[history of cryptography]] are substantially different from modern methods, and modern ciphers can be classified according to how they operate and whether they use one or two keys.
Historical pen and paper ciphers used in the past are sometimes known as [[classical cipher]]s. They include [[substitution cipher]]s and [[transposition cipher]]s. During the early [[20th century]], more sophisticated machines for encryption were used, [[rotor machine]]s, which were more complex than previous schemes.
Encryption methods can be divided into [[symmetric key algorithm]]s ([[Private-key cryptography]]) and [[asymmetric key algorithm]]s ([[Public-key cryptography]]). In a [[symmetric key algorithm]] (e.g., [[Data Encryption Standard|DES]] and [[Advanced Encryption Standard|AES]]), the sender and receiver must have a shared key set up in advance and kept secret from all other parties; the sender uses this key for encryption, and the receiver uses the same key for decryption. In an [[asymmetric key algorithm]] (e.g., [[RSA]]), there are two separate keys: a ''public key'' is published and enables any sender to perform encryption, while a ''private key'' is kept secret by the receiver and enables only him to perform decryption.
Symmetric key ciphers can be distinguished into two types, depending on whether they work on blocks of symbols of fixed size (''[[block cipher]]s''), or on a continuous stream of symbols (''[[stream cipher]]s'').
==Key size and vulnerability==
In a pure mathematical attack (ie, lacking any other information to help break a cypher), three factors above all, count:
* Mathematical advances, that allow new attacks or weaknesses to be discovered and exploited.
* Computational power available, ie the computer power which can be brought to bear on the problem.
* [[Key size]], ie the size of key used to encrypt a message. As the key size increases, so does the complexity of [[brute search]] to the point where it becomes infeasible to crack encryption directly.
Since the desired effect is computational difficulty, in theory one would choose an algorithm and desired difficulty level, thus decide the key length accordingly.
An example of this process can be found at [[http://www.keylength.com keylength.com]] which uses multiple reports to suggest that a symmetric cypher with 128 bits, an assymetric cypher with 3072 bit keys, and an elliptic curve cypher with 512 bits, all have similar difficulty at present.
== See also ==
* [[Famous ciphertexts]]
* [[Private-key cryptography]] ([[symmetric key algorithm]])
* [[Public-key cryptography]] ([[asymmetric key algorithm]])
== External links ==
*[http://www.hermetic.ch/crypto/intro.htm An Introduction to the Use of Encryption]
*[http://www.securitydocs.com/Encryption SecurityDocs] Resource for Encryption Whitepapers
*[http://www.mycrypto.net/encryption/crypto_algorithms.html Encryption Algorithms]
*[http://www.snapfiles.com/freeware/security/fwencrypt.html Freeware Encryption Software]
*[http://mathworld.wolfram.com/RSAEncryption.html RSA Encryption]
*[http://www.nabble.com/Encryption-f942.html Encryption Forum]
*[http://www.securestandard.com/Cryptology SecureStandard] Directory of Encryption Whitepapers
*[http://www.elfqrin.com/codecracker.html Code Cracker] Cracks many classic encryption codes (up to the 20th century)
{{classical_cryptography}}
{{stream_ciphers}}
{{block_ciphers}}
{{Public-key cryptography}}
[[Category:Computer security]]
[[Category:Cryptography]]
[[da:Kryptering]]
[[de:Verschlüsselung]]
[[et:Šifreerimine]]
[[eo:Ĉifrado]]
[[fr:Chiffrement]]
[[id:Enkripsi]]
[[is:Dulkóðun]]
[[nl:Encryptie]]
[[ja:暗号]]
[[pl:Szyfr]]
[[ru:Шифрование]]
[[simple:Encryption]]
[[sv:Kryptering]]
[[th:การเข้ารหัส]]
[[vi:Mã hóa]]
[[zh:加密]]
|