[Home]Cryptology

HomePage | Recent Changes | Preferences

Showing revision 12
Cryptology is an engineering discipline, informed by telecommunications engineering practice, the communications theory aspects of information theory (see Shannon and Weaver, Mathematical Theory of Communication, Univ of Ill Press, (about 1949), and Shannon's articles (in 1949?) in the Bell System Technical Journal on communications secrecy, and by the theory of computational complexity. The field is not a science in that questions of practicality and cost-effectiveness predominate in actual practice. Except in the sense that some proposed algorithm or protocol may be shown to be insecure under current conditions (cryptanalytic tools, computational capability, funding and staff available to an attacker, etc.), there is no opportunity to perform experimental tests of hypotheses about cryptopgraphic assertions. Cryptology is concerned with communications in secure, and often secret, form. It encompasses both cryptography and cryptanalysis. Some writers prefer to use cryptography as the overall term.

The term cryptology is derived from the Greek kryptós, "hidden," and lógos, "word." Note that cryptology/cryptography encompasses much more than mere secrecy. Cryptographic security may result (when, and only when, well chosen algorithms and protocols are properly used); these intentions may include authentication of the participants to each other (with or without secrecy), integrity checks of messages sent (also with or without secrecy), and of course secrecy of the message sent. In most instances, secrecy obtains when legitimate users, the transmitter and the receiver, are able to transform information into a ciphertext? by use of an encryption algorithm (in all modern cases controlled by one of many possible [cryptographic key]?s) -- i.e., a piece of information which customizes the operation of the encryption algorithm. For a large class of such algorithms, the key is known to both users and must not be known by any other. Although the cipher is inscrutable and often unforgeable to anyone without this secret key, the authorized receiver can either decrypt the cipher to recover the hidden information or verify that it was sent in all likelihood by someone possessing the key.

Much is frequently confused, and misused, in discussions of cryptography. Readers are warned that there is much irresponsible and poorly informed, but authoritatively stated, information available on the subject. Terms often confused, with unfortunate consequences on understanding, are code and cipher. Even experts occasionally employ these terms as though they were synonymous.

"Crypto" is a common abbreviation for cryptology.


See also:


HomePage | Recent Changes | Preferences
This page is read-only | View other revisions | View current revision
Edited October 2, 2001 10:24 am by Larry Sanger (diff)
Search: