Cipher

From WikiMD's Wellness Encyclopedia

Error creating thumbnail:
Edward Larsson 1885 I
Caesar cipher left shift of 3
Error creating thumbnail:
AES (Rijndael) Round Function

Cipher refers to an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An essential element of modern communications, ciphers are used to secure electronic data and online communications through the use of cryptographic keys. The study of ciphers falls under the field of cryptography, which has evolved significantly through history from simple manual encryption methods to complex computer algorithms.

History[edit | edit source]

The history of ciphers dates back to ancient times when rulers and military leaders needed to communicate their strategies securely. The earliest known use of a cipher was by the Roman military leader Julius Caesar, who used what is now known as the Caesar cipher to protect messages of military significance. Over the centuries, the complexity of ciphers has evolved significantly, with the Enigma machine used by Germany during World War II being one of the most famous historical examples of cipher technology.

Types of Ciphers[edit | edit source]

Ciphers can be broadly classified into two categories: symmetric-key cryptography and asymmetric-key cryptography.

Symmetric-key Cryptography[edit | edit source]

In symmetric-key cryptography, the same key is used for both encryption and decryption. This category includes both stream ciphers and block ciphers. Stream ciphers encrypt the digits (typically bits) of a message one at a time, while block ciphers take a number of bits and encrypt them as a single unit.

Asymmetric-key Cryptography[edit | edit source]

Asymmetric-key cryptography, also known as public-key cryptography, uses two different but mathematically related keys: one for encryption and the other for decryption. The public key is shared openly, allowing anyone to encrypt a message, but decryption can only be performed by someone who possesses the corresponding private key.

Modern Use[edit | edit source]

Today, ciphers are integral to the secure transmission of information over the Internet. They are used in various applications, including Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocols for secure web browsing, encrypted email, and secure messaging apps. The development and analysis of ciphers to withstand various types of cryptographic attacks is a critical area of research in information security.

Cryptanalysis[edit | edit source]

Cryptanalysis is the study of analyzing information systems to understand the hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

See Also[edit | edit source]

Cipher Resources
Wikipedia
WikiMD
Navigation: Wellness - Encyclopedia - Health topics - Disease Index‏‎ - Drugs - World Directory - Gray's Anatomy - Keto diet - Recipes

Search WikiMD

Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD

WikiMD's Wellness Encyclopedia

Let Food Be Thy Medicine
Medicine Thy Food - Hippocrates

Medical Disclaimer: WikiMD is not a substitute for professional medical advice. The information on WikiMD is provided as an information resource only, may be incorrect, outdated or misleading, and is not to be used or relied on for any diagnostic or treatment purposes. Please consult your health care provider before making any healthcare decisions or for guidance about a specific medical condition. WikiMD expressly disclaims responsibility, and shall have no liability, for any damages, loss, injury, or liability whatsoever suffered as a result of your reliance on the information contained in this site. By visiting this site you agree to the foregoing terms and conditions, which may from time to time be changed or supplemented by WikiMD. If you do not agree to the foregoing terms and conditions, you should not enter or use this site. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.

Contributors: Prab R. Tumpati, MD