Cipher

From WikiMD's medical encyclopedia

(Redirected from Decipherable)

Edward Larsson 1885 I
Caesar cipher left shift of 3
AES (Rijndael) Round Function

Cipher refers to an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An essential element of modern communications, ciphers are used to secure electronic data and online communications through the use of cryptographic keys. The study of ciphers falls under the field of cryptography, which has evolved significantly through history from simple manual encryption methods to complex computer algorithms.

History

The history of ciphers dates back to ancient times when rulers and military leaders needed to communicate their strategies securely. The earliest known use of a cipher was by the Roman military leader Julius Caesar, who used what is now known as the Caesar cipher to protect messages of military significance. Over the centuries, the complexity of ciphers has evolved significantly, with the Enigma machine used by Germany during World War II being one of the most famous historical examples of cipher technology.

Types of Ciphers

Ciphers can be broadly classified into two categories: symmetric-key cryptography and asymmetric-key cryptography.

Symmetric-key Cryptography

In symmetric-key cryptography, the same key is used for both encryption and decryption. This category includes both stream ciphers and block ciphers. Stream ciphers encrypt the digits (typically bits) of a message one at a time, while block ciphers take a number of bits and encrypt them as a single unit.

Asymmetric-key Cryptography

Asymmetric-key cryptography, also known as public-key cryptography, uses two different but mathematically related keys: one for encryption and the other for decryption. The public key is shared openly, allowing anyone to encrypt a message, but decryption can only be performed by someone who possesses the corresponding private key.

Modern Use

Today, ciphers are integral to the secure transmission of information over the Internet. They are used in various applications, including Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocols for secure web browsing, encrypted email, and secure messaging apps. The development and analysis of ciphers to withstand various types of cryptographic attacks is a critical area of research in information security.

Cryptanalysis

Cryptanalysis is the study of analyzing information systems to understand the hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

See Also

WHO Rod.svg
This article is a medical stub. You can help WikiMD by expanding it!
PubMed
Wikipedia
Navigation: Wellness - Encyclopedia - Health topics - Disease Index‏‎ - Drugs - World Directory - Gray's Anatomy - Keto diet - Recipes

Transform your life with W8MD's budget GLP-1 injections from $125.

W8mdlogo.png
W8MD weight loss doctors team

W8MD offers a medical weight loss program to lose weight in Philadelphia. Our physician-supervised medical weight loss provides:

NYC weight loss doctor appointments

Start your NYC weight loss journey today at our NYC medical weight loss and Philadelphia medical weight loss clinics.

Linkedin_Shiny_Icon Facebook_Shiny_Icon YouTube_icon_(2011-2013) Google plus


Advertise on WikiMD

WikiMD's Wellness Encyclopedia

Let Food Be Thy Medicine
Medicine Thy Food - Hippocrates

Medical Disclaimer: WikiMD is not a substitute for professional medical advice. The information on WikiMD is provided as an information resource only, may be incorrect, outdated or misleading, and is not to be used or relied on for any diagnostic or treatment purposes. Please consult your health care provider before making any healthcare decisions or for guidance about a specific medical condition. WikiMD expressly disclaims responsibility, and shall have no liability, for any damages, loss, injury, or liability whatsoever suffered as a result of your reliance on the information contained in this site. By visiting this site you agree to the foregoing terms and conditions, which may from time to time be changed or supplemented by WikiMD. If you do not agree to the foregoing terms and conditions, you should not enter or use this site. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates, categories Wikipedia, licensed under CC BY SA or similar.

Contributors: Prab R. Tumpati, MD