2024-07-12
한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina
According to the "Cryptography Law of the People's Republic of China", passwords are defined as follows:
Cryptography refers to technologies, products and services that use specific transformation methods to encrypt and protect information and provide security authentication.
Cryptography is the technical science of coding and deciphering codes.From the definition, we can know that cryptography is divided into two main branches:
For the five attributes of information security (confidentiality, integrity, authentication, non-repudiation, and availability), you can jump to read my other article:【Cryptology】Five Attributes of Information Security
The basic model of cryptographic algorithms includes: the five elements of cryptographic systems and the basic requirements of cryptographic algorithms
The five elements of a cryptographic system are: plaintext space, ciphertext space, key space, encryption algorithm, and decryption algorithm. For more details, you can jump to read my other article:【Cryptology】Five Elements of Cryptography
A cryptographic algorithm is essentially a mathematical function with secret parameters that follows certain mathematical rules to transform data.
An ideal cryptographic system should be highly reversible in the encryption process, irreversible without a key, and highly sensitive to the selection and protection of the key. Only such a cryptographic system can provide reliable information protection in practical applications.
characteristic | describe |
---|---|
Reversibility | The encryption process should be reversible if the correct key is used. |
Irreversibility (safety) | When designing an algorithm, it is necessary to consider various possible attacks so that the adversary cannot restore the ciphertext to plaintext. |
Key sensitivity | The key is the secret parameter of the encryption algorithm. Even if the encryption algorithm is known, it is difficult to recover the plaintext without the key. |
A good cryptographic system should meet at least two conditions: