ITWissen.info - Tech know how online

cipher

If a message has to be encrypted for secrecy purposes, it is initially available as plaintext. If it is then encrypted according to a specified key, the string of seemingly meaningless characters is called ciphertext or ciphertext.

The ciphertext is created from the plaintext with the help of the cipher. The cipher itself is a bit combination generated from a cryptoalgorithm that cannot be decrypted. The cipher is divided into asymmetric and symmetric ciphers, which are divided into block ciphers and stream ciphers.

Principle of encryption and decryption

Principle of encryption and decryption

The two most common, but also easy to break encryption methods are the substitution cipher, with which characters are recoded according to a character list, also known as substitution box, and the transposition cipher, in which letters of a plaintext are rearranged according to a certain scheme.

Informationen zum Artikel
Englisch: cipher
Updated at: 28.02.2008
#Words: 194
Links: