Cryptography (sometimes known as cryptology) is the mathematical and computational study of information security; in particular the study of methods used to transmit information securely between two or more parties, unreadable by unauthorized eavesdroppers. Cryptography finds many applications in the modern world, e.g. protecting online logins, smart card protocols, email privacy, confidential documents, and so on.

Four rotor German naval Enigma machine on display at Bletchley Park.

Fundamentals

edit

Usually, to protect information from being revealed, a person will attempt to render the information unreadable by anyone without some secret information. This process is called encryption. The original data is usually called the plaintext, while the resulting scrambled data is usually called the ciphertext. The secret information can take the form of a password, a number, a file, etc. and is usually called the key (as it can "unlock" the ciphertext).

Any authorized party should be able to, given a ciphertext and its secret key, reconstruct the original information, in a process known as decryption. This allows several parties to transmit information securely using a shared secret key. There are many different methods to perform encryption, varying widely in simplicity and security. These methods are usually called ciphers.

Much of cryptography is also devoted to the opposing field of cryptanalysis, the act of trying to "break" a cipher so that encrypted information can be retrieved, using only part or none of the secret key, by an adversary. The continuous feedback between cryptographers, who develop ciphers, and cryptoanalysts, who break them, has led to the development of many advanced and secure ciphers used today.

There is also some confusion between codes and ciphers. A code is a symbol, whether it be a letter or a symbol, which stands for a word, not a letter. A cipher is a symbol which stands for a letter.

Classifications

edit

Cryptography can be classified into three areas:

  • Classical - before the 20th century, simple substitution and transposition ciphers played major roles
  • Modern - mechanized and digitized cryptography came into existence in the 20th century
  • Key exchanges - Public Key and Quantum cryptography
    • Diffie-Hellman key exchange and RSA in the last few decades has enabled mass secure transmissions and internet transactions
    • Quantum Cryptography - As quantum computers come into existence, algorithms and protocols are fast being developed for this new platform.

Readings and learning media

edit

Videos

edit

Lessons

edit

Additional Study

edit

Offsite courses

edit

With video lectures

edit
  1. Cryptography I, Dan Boneh, Stanford University, 2014
  2. Cryptography II, Dan Boneh, Stanford University, 2014
  3. Applied Cryptography, Dave Evans, University of Virginia (self paced course on Udacity)

Without video lectures

edit
  1. Modern Cryptology, William Cherowitzo, University of Colorado, Spring 2012.
  2. Introduction to Cryptography, Yehuda Lindell, Bar-Ilan University, 2013.
  3. Foundations of Cryptography, Yehuda Lindell, Bar-Ilan University, 2014.
  4. Intuitive Advanced Cryptography, Nguyen Thoi Minh Quan.
edit

See also

edit
  • openssl implementation of the TSL cryptographic protocol
  NODES
INTERN 2
Note 1