[Home]History of Cryptography/Key

HomePage | Recent Changes | Preferences

Revision 8 . . December 18, 2001 9:57 am by Hagedis [improve the opening lines]
Revision 7 . . December 18, 2001 9:49 am by Hagedis [restore one claim, not sure about it.]
Revision 6 . . December 18, 2001 9:34 am by Hagedis [relatively minor edits and links.]
Revision 5 . . (edit) December 16, 2001 4:39 am by Taw [/Talk]
Revision 4 . . December 16, 2001 4:37 am by (logged).150.138.xxx [*expanded one or two comments about key vulnerability]
Revision 3 . . December 16, 2001 4:26 am by (logged).150.138.xxx [*added comments on keys and security, clarified some language]
Revision 2 . . October 31, 2001 11:48 pm by (logged).203.83.xxx [Created]
  

Difference (from prior major revision) (author diff)

Changed: 1c1
A cryptographic key is a small amount of information, without which encrypted data will not in practice be convertible back to its original form -- at least for high quality encryption algorithms. Most cryptographic algorithms use a single key which is used both to encrypt and decrypt the data: they are known as symmetric algorithms. An attacker who obtains the key can recover the original message from the encrypted data, since as a matter of principle the details of the cryptographic algorithm used is assumed to be already available to the attacker. This design assumption is usually known in crypto circles as Kerchoff's Law, or in more colloquial form, Shannon's Maxim.
A cryptographic key is a small amount of information that is used by an algorithm that encrypts or decrypts a message, or "plaintext". If the decryption key is lost, encrypted data will not in practice be convertible back to its original form -- at least for high quality encryption algorithms and large enough key sizes. Most cryptographic algorithms use a single key which is used both to encrypt and decrypt the data: they are known as symmetric algorithms. An attacker who obtains the key can recover the original message from the encrypted data, since as a matter of principle the details of the cryptographic algorithm used is assumed to be already available to the attacker. This design assumption is usually known in crypto circles as Kerchoff's Law, or in more colloquial form, Shannon's Maxim.

HomePage | Recent Changes | Preferences
Search: