[Home]History of Cipher

HomePage | Recent Changes | Preferences

Revision 7 . . (edit) December 16, 2001 4:44 am by (logged).150.138.xxx
Revision 6 . . (edit) November 10, 2001 9:03 pm by WojPob [fixed and piped links]
Revision 3 . . (edit) September 21, 2001 9:09 am by WojPob
  

Difference (from prior major revision) (minor diff, author diff)

Changed: 1c1
A cipher, just like a code, also replaces a piece of information (an element of the plaintext that may consist of a letter or word or string of symbols) with another object. The difference is that the replacement is made according to a rule defined by a secret key known only to the transmitter and legitimate receiver(s) in the expectation that an outsider, ignorant of the key, will not be able to invert the replacement to decrypt the cipher.
A cipher, just like a code, also replaces a piece of information (a syntactic element of the plaintext that may consist of a letter or grouping of letters without meaning) with another letter or letter group. The transposition or substitution is controlled by an algorithm (or procedure). In most cases, that procedure is varied depending on a key which changes the detailed operation of the algorithm. If the algorithm is symmetric, the key must be known to the receipient and to no one else. If the algorithm is an asymmetric one, the encyphering key is different from, but closely related to, the decyphering key. If one key cannot be deduced from the other, the asymmetric key algorithm has the public/private key property and one of the keys may be made public without loss of confidentiality.

Changed: 3c3,10
In the past, the blurring of the distinction between codes and ciphers was relatively unimportant. In contemporary communications, however, information is frequently both encoded and encrypted so that it is important to understand the difference. A satellite communications link, for example, may encode information in ASCII characters if it is textual, or pulse-code modulate and digitize it in binary-coded decimal form if it is an analog signal such as speech. It then encrypts the resulting coded data into ciphers by using the Data Encryption Standard (DES). Finally, the cipher stream itself is encoded again, using error-correcting codes for transmission from the ground station to the orbiting satellite. These operations are undone, in reverse order, by the intended receiver to recover the original information.
In the past, the blurring of the distinction between codes and ciphers was relatively unimportant. In contemporary communications, however, information is frequently both encoded and encrypted so that it is important to understand the difference. A satellite communications link, for example, may 'encode' information in ASCII characters if it is textual, or into some other representation of the data such as a JPEG file if it is an image. In neither case is confidentiality a desiratum. Optionally, the transmission may then be encyphered using (for instance) the Data Encryption Standard (DES). Finally, the cipher stream itself is 'encoded' again, using error-correcting codes for transmission from the ground station to the orbiting satellite. These operations are undone, in reverse order, after reception to recover the original information.

Note the multiple meanings of the word code in this example. Thinking clearly with words having such flexibility is not easy.

Most modern ciphers fall into three main categories:
Block ciphers, [Stream ciphers]?, Symmetric key algorithms, Asymmetric key algorithms.

see also Cryptography, Cryptology

HomePage | Recent Changes | Preferences
Search: