Cryptography Classification

Cryptography Classification

Classification of Cryptographic Systems, Ciphers, Algorithms

1. This classification scheme has to do with the means of implementation
1.1. Classical : Pre Computer Era involvements of (e.g. before 1950)
1.2. Modern : Computer Era. Usually implies binary plaintext, key, ciphertext processing and /or encoding

2. This classification scheme has to do with the Key – Space properties
2.1. Symmetric, Private Key : Both, Encryption and Decryption Algorithms use the same Key
2.2. Asymmetric, usually Private – Public Key pair Algorithms : Encryption and Decryption algorithms use different keys, usually related.

3. This classification scheme has to do with the way the algorithm processes plaintext, message to be encrypted.
3.1. Block Cipher : Plain text is treated as a series of fixed length sub-messages.
3.2. Stream Cipher : Used as a Block Cipher with efficiently fixed small sized sub-messages to comply with real time applications. That is a consequence of the sort time interval available to process a sub-message, e.g. A5 of GSM cellular telephony.

Note : Other classification schemes could be suggested like synchronous, asynchronous etc.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Export of cryptography in the United States — The export of cryptography in the United States is the transfer from the United States to another country of devices and technology related to cryptography. Since World War II, many governments, including the U.S. and its NATO allies, have… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… …   Wikipedia

  • Magic (cryptography) — Magic was an Allied cryptanalysis project during World War II. It involved the United States Army s Signals Intelligence Section (SIS) and the United States Navy s Communication Special Unit. [1] Contents 1 Codebreaking 1.1 RED …   Wikipedia

  • Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Computer science — or computing science (abbreviated CS) is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems. Computer scientists invent algorithmic… …   Wikipedia

  • Group (mathematics) — This article covers basic notions. For advanced topics, see Group theory. The possible manipulations of this Rubik s Cube form a group. In mathematics, a group is an algebraic structure consisting of a set together with an operation that combines …   Wikipedia

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”