Neal Stephenson said in a novel of his called Cryptonomicon:“How long do you want these messages to remain secret?[…] I want them to remain secret for as long as men are capable of evil.”One cannot underestimate the importance of cryptology
nowadays. As the need for studying and implementing secure communication techniques rise, in the assumption of the constant existence of attackers with malicious intents, especially with the growing global force eager to preserve the privacy of user's data and government secrets at all costs. Studying these techniques can also be for the purpose of breaking secure communication in order to be able to read or alter ciphertext due to finding weaknesses in one of the cryptosystem parts.
The terminology cryptography consists of two contrary fields:
It is the group of techniques used for the purpose of conducting secure communications and mitigating the risks of MITM attacks in the presence of third parties (communications in the wild/ insecure channels e.g the Internet).In present times, cryptography is referred to as ‘encryption’. Actually, encryption represents nothing but a part of the overall cryptosystem as cryptography is composed of encryption (transforming plaintext to an unreadable format by humans or machines without the corresponding cipher aka. cipher or encryption algorithms or codes
) and decryption which is the reverse process.
It is the study of a cryptosystem in the desire of identifying its hidden aspects and crack it all the way to access plaintext without knowing the decryption key. This can be done by not only analyzing the used algorithms to determine the used cipher and key but also by scanning for weaknesses in their implementation and exploiting them as they get increasingly harder and more complex to keep up with more modern sophisticated ciphers.
Although cryptology as a field is seeing a great evolution in cryptography and cryptanalysis, the terminology remains the same as the cryptosystems’ components are constant.
- Plaintext: It is the messaged being sent and wanted to be changed for privacy/security purposes. It should be understandable by both parties (sender and receiver) and contains data which is mostly not meant to be disclosed or intercepted in its raw format.
- Cipher/Cypher: It is a type of algorithms used for performing an encryption or decryption process conserving the length between the input (plain-text) and the output (cipher-text).
- Encryption/Decryption algorithm: Has the same concept as the cipher with the exception that the length varies between plaintext and ciphertext.
- Encryption/Decryption keys: For security purposes, algorithms use d in encryption and decryption became public (e.g: RSA) with a variable key. A key is a generated parameter used in the transformation of data (encrypt/decrypt). The use of the same key in encryption and decryption makes the used algorithm symmetric, and if it’s not the same then the used algorithm is asymmetric.