Strong cryptography: Difference between revisions

Content deleted Content added
top: added information
m Background: style
Line 10:
 
==Background==
The level of expense required for strong cryptography originally restricted its use to the government and military agencies.{{sfn|Vagle|2015|p=110}} US government, in particular, was able to keep a monopoly on the development of cryptography in the US into the 1960s.{{sfn|Vagle|2015|p=109}} In the 1970, the increased availability of powerful computers and unclassified research breakthroughs ([[Data Encryption Standard]], the [[Diffie-Hellman]] and [[RSA (algorithm)|RSA]] algorithms) made strong cryptography available for civilian use.{{sfn|Vagle|2015|p=119}} Mid-1990s saw the worldwide proliferation of knowledge and tools for strong cryptography.{{sfn|Vagle|2015|p=119}}
 
The use of computers changed the process of cryptanalysis, famously with [[Bletchley Park]]'s [[Colossus computer|Colossus]]. But just as the development of digital computers and electronics helped in cryptanalysis, it also made possible much more complex ciphers. It is typically the case that use of a quality cipher is very efficient, while breaking it requires an effort many orders of magnitude larger - making cryptanalysis so inefficient and impractical as to be effectively impossible.