We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Cryptography?

By Dan Blacharski
Updated: May 17, 2024
Views: 44,482
Share

Everyone has secrets, and some have more than others. When it becomes necessary to transmit those secrets from one point to another, it's important to protect the information while it's in transit. Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination.

Predating computers by thousands of years, cryptography has its roots in basic transposition ciphers, which assign each letter of the alphabet a particular value. A simple example is to assign each letter a progressively higher number, where A=1, B=2, and so forth. Using this formula for example, the word "wiseGEEK", once encrypted, would read "23 9 19 5 7 5 5 11". During World War Two, machines were invented that made the ciphers more complicated and difficult to break, and today, computers have made them even stronger still.

The Secure Sockets Layer (SSL) is a common encryption protocol used in e-commerce. When someone makes a purchase over the Internet, this is the technology the merchant uses to make sure that the buyer can safely transmit his credit card information. Using this protocol, the computer and the online merchant's computer agree to create a type of private "tunnel" through the public Internet. This process is called the "handshake." When a URL in a Web browser starts with "https" instead of "http," it is a secure connection that is using SSL.

Some methods of cryptography use a "secret key" to allow the recipient to decrypt the message. The most common secret key cryptosystem is the Data Encryption Standard (DES), or the more secure Triple-DES, which encrypts the data three times.

More common are systems that use a public key system, such as the Diffie-Hellman key agreement protocol. This system uses two keys that work together: a public one, which anyone can access, and a private one, which is kept secret by the party receiving the data. When a person wants to send a secure message to someone else, the person encrypts that message using the recipient's public key. Once encrypted, the recipient must use his or her private key to decrypt it.

The goal of cryptography extends beyond merely making data unreadable; it also extends into user authentication, which is providing the recipient with assurance that the encrypted message originated from a trusted source. Hash functions are sometimes used in conjunction with private key or public key systems. This is a type of one-way encryption, which applies an algorithm to a message, such that the message itself cannot be recovered. Unlike key-based cryptography, the goal of the hash function is not to encrypt data for later decryption, but to create a sort of digital fingerprint of a message. The value derived from applying the hash function can be re-calculated at the receiving end, to ensure that the message has not been tampered with during transit. Then, a key-based system is applied to decipher the message.

The study of this field is advancing steadily, and scientists are rapidly creating mechanisms that are more difficult to break. The most secure type yet may be quantum cryptography, a method that has not yet been perfected. Instead of using a key, it relies on the basic laws of physics and the movement and orientation of photons to establish a connection that is absolutely secure and unbreakable.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Editors' Picks

Discussion Comments
By anon350910 — On Oct 09, 2013

This sounds very hard and easy at the same time. How do I become one?

By anon141678 — On Jan 11, 2011

It is also interesting to think, that all the cryptographic methods used throughout the entire history of the human use of this skill, become obsolete and useless once they have been solved or made public. Because of this, everything that was ever encrypted before in the history of the human race, is now easily and quickly decipherable using our advanced programming technologies along with the latest in high speed computing power, provided you have access to enough of that computing power.

I wonder how long 256 bit encryption technologies have been broken, by whom, and for what -- and I'm sure it's still an exclusive club. Mfs Energy.

By anon108503 — On Sep 03, 2010

A tough field, but i like it!

By anon99930 — On Jul 27, 2010

It's greatly helpful. thank you.

By anon74651 — On Apr 03, 2010

Greatness lies in exploring the world you live into, along with the capability to manage its existence. So a great, new field has emerged.

By anon68328 — On Mar 02, 2010

i am feeling very proud to be a communication engineer.

By leilani — On Dec 10, 2009

This sounds like a rather complicated field!

Share
https://www.wisegeek.net/what-is-cryptography.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.