## Overview [1]#

Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφω, gráphō, "I write", or -λογία, -logia, respectively) s the practice and study of techniques for secure communication in the presence of third parties (called adversaries)### The story#

We often see and use Cryptography where the desire is for Alice to send a Message to Bob in presence of (the adversaries) Eve and Mallory.

is the practice and study of hiding information. In modern times, cryptography is considered a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography.[1]

In Cryptography discussions we typically make a Computational Hardness Assumption.

### Cryptography Objectives#

There are some differing opinions on Cryptography Objectives

### Major Types of Cryptography#

- Symmetric Key Cryptography - When using Symmetric Key Cryptography all parties must trust each other, because they can read each other's messages.
- Asymmetric Key Cryptography - each participant possesses a private and a public key.

### Cryptographic Systems#

Cryptographic Systems are what provide Cryptography. Taking any Cryptographic Primitive or isolated Cryptography piece will not allow meeting the objectives. Most breaches are caused by a Cryptographically Weakness that has been introduced in the Cryptographic process, often by improper implementation.### Cryptographic Hash Functions#

A Cryptographic Hash Function or Message Digest is the output of a Secure Hash Algorithm which permeates a source message of variable length into a highly unique, fixed-length digital fingerprint (signature). Cryptographic Hash Functions cannot be used to reconstitute the original message but can be used by one participant to prove that another participant possesses some secret material (for example, a password). This proof can then be used to establish an identity.### More Information#

There might be more information for this subject on one of the following:- 10 Reasons Why OpenID Connect
- Alice And Bob
- Apple Pay
- Block Cipher
- Block cipher mode of operation
- Bob Blakley
- CIA
- Certificate
- Certificate Authority
- Chip Card
- Cipher Block Chaining
- Ciphertext
- Code_verifier
- Computational Hardness Assumption
- Cryptographic
- Cryptographic Key
- Cryptographically Weak
- Cryptographically secure pseudorandom number generator
- DES
- Decentralized Identifier
- ECC
- ECDSA
- EMV Terms
- Elliptic Curve
- Elliptic Curve Diffie-Hellman
- Elliptic Curve Digital Signature Algorithm
- Enciphered PIN
- Entropy
- Export-grade
- FIDO Standards
- FLUSH+RELOAD
- FREAK
- Glossary Of LDAP And Directory Terminology
- Integrity
- Java Authentication and Authorization Service
- Kerberos
- Key-Exchange
- Keyed-Hash Message Authentication Code
- LeftMenu
- Logjam
- MAC
- Network Security Services
- Novell International Cryptographic Infrastructure
- OTP
- Off-the-Record Messaging
- Offline Data Authentication
- Open Protocol for Access Control, Identification, and Ticketing with privacY
- PKCS7
- PSK
- Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)
- Pseudorandom function
- Pseudorandom generators
- Public Key Cryptography
- Public-Key Cryptography Standards
- RFC 2347
- RFC 4492
- RSA Cryptography
- Record Protocol
- Secure Socket Layer
- Self-signed Certificate
- Shared Secret
- Side-channel attacks
- Stellar Ledger
- Supported Groups Registry
- Symmetric Key Cryptography
- TLS 1.3
- TLS Proxy
- Token Binding Protocol
- Token Binding over HTTP
- Trust Anchor
- United States Cryptography Export-Import Laws
- Webtask
- X.509
- Zero-knowledge proof

- [#1] - Cryptography - based on information obtained 2013-04-10

### Add new attachment

Only authorized users are allowed to upload new attachments.