"암호학"의 두 판 사이의 차이
둘러보기로 가기
검색하러 가기
Pythagoras0 (토론 | 기여) (새 문서: * Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.o...) |
Pythagoras0 (토론 | 기여) (→노트) |
||
(같은 사용자의 중간 판 4개는 보이지 않습니다) | |||
1번째 줄: | 1번째 줄: | ||
+ | ==개요== | ||
+ | * 암호학은 정보를 의도하지 않은 수신자가 이해할 수 없는 형태로 변환하여 정보를 안전하게 유지하는 과학이다. | ||
+ | * 암호학은 현대의 통신환경에서 필수적이다. | ||
+ | * 공개 키 암호화는 모든 시민에게 강력한 암호화를 사용할 수 있게 해주는 기술이다. | ||
+ | |||
+ | |||
+ | ==메모== | ||
* Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.org/abs/1508.01375. | * Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.org/abs/1508.01375. | ||
+ | |||
+ | |||
+ | == 노트 == | ||
+ | |||
+ | * In all cases, cryptography, the coding enabling information to be kept secret, was flawed or missing.<ref name="ref_367a">[https://www.merriam-webster.com/dictionary/cryptography Definition of Cryptography by Merriam-Webster]</ref> | ||
+ | * For years online security has focused on hard technical problems: Fixing software bugs or concealing data with cryptography.<ref name="ref_367a" /> | ||
+ | * When you hear the word "cryptography," your brain probably jumps to someone sitting in a dark room staring at lines of code.<ref name="ref_927f">[https://interestingengineering.com/what-is-cryptography What is Cryptography?]</ref> | ||
+ | * Secret key cryptography uses one key across both the sending encryption and the receiver's decryption.<ref name="ref_927f" /> | ||
+ | * Public Key Cryptography allows for the use of two keys, which are different for the sender and receiver.<ref name="ref_927f" /> | ||
+ | * Drawing back to the question at hand, what is cryptography, the answer is fairly simple.<ref name="ref_927f" /> | ||
+ | * Asymmetric encryption (or public-key cryptography) uses a separate key for encryption and decryption.<ref name="ref_9581">[https://www.digicert.com/faq/ssl-cryptography.htm All about SSL Cryptography]</ref> | ||
+ | * Today, cryptography is used to protect digital data.<ref name="ref_c0bd">[https://techterms.com/definition/cryptography Cryptography Definition]</ref> | ||
+ | * An example of basic cryptography is a encrypted message in which letters are replaced with other characters.<ref name="ref_c0bd" /> | ||
+ | * Therefore, modern cryptography involves developing encryption methods that are difficult for even supercomputers to break.<ref name="ref_c0bd" /> | ||
+ | * The OECD Recommendation Concerning Guidelines for Cryptography Policy were adopted on 27 March 1997.<ref name="ref_aad4">[https://www.oecd.org/sti/ieconomy/guidelinesforcryptographypolicy.htm OECD Guidelines for Cryptography Policy]</ref> | ||
+ | * However, the widespread use of cryptography raises a number of important issues.<ref name="ref_aad4" /> | ||
+ | * Traditionally, cryptography was most often used only by governments.<ref name="ref_aad4" /> | ||
+ | * Effective cryptography is an essential tool in a network environment for addressing these concerns.<ref name="ref_aad4" /> | ||
+ | * Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical.<ref name="ref_054d">[https://www.barcodesinc.com/articles/cryptography2.htm Barcodes Inc.]</ref> | ||
+ | * A key tool to secure the confidentiality of electronic communications is encryption or cryptography.<ref name="ref_a35a">[https://dictionary.cambridge.org/dictionary/english/cryptography meaning in the Cambridge English Dictionary]</ref> | ||
+ | * In other words cryptography can be used as an electronic signature.<ref name="ref_a35a" /> | ||
+ | * Public-key cryptography is typically based on mathematical problems that are relatively easy to perform but cannot be easily reversed.<ref name="ref_5cbe">[https://docs.aws.amazon.com/ko_kr/crypto/latest/userguide/concepts-algorithms.html AWS cryptography services]</ref> | ||
+ | * "The Joy of Cryptography" is a silly title, but all the sensible titles were already taken.<ref name="ref_8947">[https://web.engr.oregonstate.edu/~rosulekm/crypto/ The Joy of Cryptography]</ref> | ||
+ | * It was at least better than "You Can't Spell Cryptography without Cry".<ref name="ref_8947" /> | ||
+ | * Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it.<ref name="ref_bb58">[https://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/SSim/history.html Cryptography Defined]</ref> | ||
+ | * Public key cryptography adds a very significant benefit - it can serve to authenticate a source (e.g. a digital signature).<ref name="ref_bb58" /> | ||
+ | * Public key cryptography was invented by Whitfield Diffie and Martin Hellman in 1975.<ref name="ref_bb58" /> | ||
+ | * Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm.<ref name="ref_4d87">[https://docs.microsoft.com/en-us/dotnet/api/system.security.cryptography System.Security.Cryptography Namespace]</ref> | ||
+ | * TripleDESCng Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.<ref name="ref_4d87" /> | ||
+ | * The second phase, the mechanization of cryptography, began shortly after World War I and continues even today.<ref name="ref_1197">[https://www.britannica.com/topic/cryptology/History-of-cryptology Cryptology - History of cryptology]</ref> | ||
+ | * It is tempting to equate this phase with the appearance of public-key cryptography, but that is too narrow a view.<ref name="ref_1197" /> | ||
+ | * It could be said that cryptography, or the art of secret writing, was born with writing itself.<ref name="ref_f499">[http://www.fgcsic.es/lychnos/en_en/articles/cryptography_if_it_didnt_exist_we_would_have_to_invent_it Cryptography: if it didn’t exist, we would have to invent it]</ref> | ||
+ | * The world we know today would be impossible without cryptography.<ref name="ref_f499" /> | ||
+ | * For this reason, public-key cryptography is also known as asymmetric cryptography.<ref name="ref_f499" /> | ||
+ | * None of these marvels would be possible without cryptography.<ref name="ref_f499" /> | ||
+ | * As of Android 9 (API level 28), the Crypto Java Cryptography Architecture (JCA) provider has been removed.<ref name="ref_fb58">[https://developer.android.com/guide/topics/security/cryptography Android Developers]</ref> | ||
+ | * Public key encryption is a technological revolution offering every citizen the opportunity to use robust cryptography.<ref name="ref_fb74">[https://www.cases.lu/knowhow/glossary/Cryptography.html Cryptography]</ref> | ||
+ | * Cryptography techniques Cryptography is closely related to the disciplines of cryptology and cryptanalysis.<ref name="ref_785c">[https://searchsecurity.techtarget.com/definition/cryptography Definition from WhatIs.com]</ref> | ||
+ | * However, cryptography makes it harder for attackers to access messages and data protected by encryption algorithms.<ref name="ref_785c" /> | ||
+ | * Cryptography is the science of keeping information secure by transforming it into form that unintended recipients cannot understand.<ref name="ref_3a93">[https://www.csoonline.com/article/3583976/what-is-cryptography-how-algorithms-keep-information-secret-and-safe.html What is cryptography? How algorithms keep information secret and safe]</ref> | ||
+ | * Encryption is an important part of cryptography, but doesn't encompass the entire science.<ref name="ref_3a93" /> | ||
+ | * For most of history, cryptography consisted of various substitution ciphers deployed to keep government and military communications secure.<ref name="ref_3a93" /> | ||
+ | * In fact, the development of computers and advances in cryptography went hand in hand.<ref name="ref_3a93" /> | ||
+ | * Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa.<ref name="ref_87e0">[https://economictimes.indiatimes.com/definition/cryptography What is Cryptography? Definition of Cryptography, Cryptography Meaning]</ref> | ||
+ | * Symmetric-key Cryptography: Both the sender and receiver share a single key.<ref name="ref_87e0" /> | ||
+ | * In Public-Key Cryptography two related keys (public and private key) are used.<ref name="ref_87e0" /> | ||
+ | * With symmetric cryptography, the same key is used for both encryption and decryption.<ref name="ref_fb62">[https://www.synopsys.com/glossary/what-is-cryptography.html What Is Cryptography and How Does It Work?]</ref> | ||
+ | * Prior to the early 20th century, cryptography was mainly concerned with linguistic and lexicographic patterns.<ref name="ref_d7de">[https://en.wikipedia.org/wiki/Cryptography Cryptography]</ref> | ||
+ | * Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.<ref name="ref_d7de" /> | ||
+ | * Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970s.<ref name="ref_d7de" /> | ||
+ | * Since then, cryptography has become a widely used tool in communications, computer networks, and computer security generally.<ref name="ref_d7de" /> | ||
+ | * But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.<ref name="ref_ec4d">[https://www.garykessler.net/library/crypto.html An Overview of Cryptography]</ref> | ||
+ | * The second is to provide some real examples of cryptography in use today.<ref name="ref_ec4d" /> | ||
+ | * It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications.<ref name="ref_ec4d" /> | ||
+ | * In cryptography, we start with the unencrypted data, referred to as plaintext.<ref name="ref_ec4d" /> | ||
+ | * Cryptography deals with the actual securing of digital data.<ref name="ref_f770">[https://www.tutorialspoint.com/cryptography/modern_cryptography.htm Modern Cryptography]</ref> | ||
+ | * The primary objective of using cryptography is to provide the following four fundamental information security services.<ref name="ref_f770" /> | ||
+ | * Cryptography may also refer to the art of cryptanalysis, by which cryptographic codes are broken.<ref name="ref_48d7">[https://www.britannica.com/topic/cryptography Cryptography]</ref> | ||
+ | * Collectively, the science of secure and secret communications, involving both cryptography and cryptanalysis, is known as cryptology.<ref name="ref_48d7" /> | ||
+ | * The principles of cryptography are today applied to the encryption of fax, television, and computer network communications.<ref name="ref_48d7" /> | ||
+ | * This Edureka video about what is Cryptography and why it is essential to protect the information shared across the internet.<ref name="ref_e1d1">[https://www.edureka.co/blog/what-is-cryptography/ Cryptographic Algorithms]</ref> | ||
+ | * That’s where Encryption or Cryptography comes in.<ref name="ref_e1d1" /> | ||
+ | * Further drilling down, Classical Cryptography is divided into Transposition Cipher and Substitution Cipher.<ref name="ref_e1d1" /> | ||
+ | * cryptography is a package which provides cryptographic recipes and primitives to Python developers.<ref name="ref_0402">[https://pypi.org/project/cryptography/ cryptography]</ref> | ||
+ | * In this segment, we'll discuss the fundamental concepts behind modern cryptography.<ref name="ref_bb0d">[https://www.maximintegrated.com/en/design/technical-documents/tutorials/7/7254.html Technical Training]</ref> | ||
+ | * Asymmetric keys and symmetric keys are two basic types of algorithms that are used in modern cryptography.<ref name="ref_bb0d" /> | ||
+ | * In addition, cryptography also covers the obfuscation of information in images using techniques such as microdots or merging.<ref name="ref_a240">[https://usa.kaspersky.com/resource-center/definitions/what-is-cryptography What is Cryptography?]</ref> | ||
+ | * When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.<ref name="ref_a240" /> | ||
+ | * In public key cryptography, we use a public and a private key.<ref name="ref_602d">[https://www.sciencedirect.com/topics/computer-science/cryptography Cryptography - an overview]</ref> | ||
+ | * In general, cryptography provides us with a mechanism to protect data at rest, in motion, and, to a certain extent, in use.<ref name="ref_602d" /> | ||
+ | * Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.<ref name="ref_c308">[https://docs.microsoft.com/ko-kr/dotnet/api/system.security.cryptography System.Security.Cryptography 네임스페이스]</ref> | ||
+ | ===소스=== | ||
+ | <references /> | ||
+ | |||
+ | == 웹 브라우저== | ||
+ | |||
+ | ===말뭉치=== | ||
+ | # If you’re reading this, then I hope that sometime somebody or some web site told you that doing cryptography in a web browser is a bad idea.<ref name="ref_bede0317">[https://tonyarcieri.com/whats-wrong-with-webcrypto What’s wrong with in-browser cryptography?]</ref> | ||
+ | # Why not put cryptography in the browser?<ref name="ref_bede0317" /> | ||
+ | # What we see happening here is cryptography being used to protect the web site’s interests, not the user’s.<ref name="ref_bede0317" /> | ||
+ | # For example, there are cryptography libraries that exist in both Java and Flash.<ref name="ref_9325ff6e">[https://sking7.github.io/articles/469176174.html Cryptography in the Browser]</ref> | ||
+ | # There are two main criticisms of doing cryptography in JavaScript: security and speed.<ref name="ref_9325ff6e" /> | ||
+ | # For example, the post makes the point that Math.random() is not a good source of randomness, and thus it is impossible to get a suitable amount of random numbers for cryptography.<ref name="ref_9325ff6e" /> | ||
+ | # Until recently, JavaScript has been too slow to perform the many complex computations required for secure cryptography.<ref name="ref_9325ff6e" /> | ||
+ | # The Console uses browser cryptography both during authentication and to protect stored values the server is not meant to see.<ref name="ref_848fbc21">[https://tozny.com/blog/making-browser-crypto-safe/ Making Browser Crypto Safe for the Modern Web]</ref> | ||
+ | # It does mean you’re following best practices and making solid steps towards a stable, secure website and can more safely use tools like browser cryptography on modern browsers.<ref name="ref_848fbc21" /> | ||
+ | # Such an infrastructure would not only be useful for integrity checking cryptography code, but could be used to mitigate XSS attacks.<ref name="ref_ca4c051c">[https://defuse.ca/web-browser-javascript-cryptography.htm Web Browser Cryptography is a Good Thing]</ref> | ||
+ | # The Web Cryptography API is a proposed addition to the HTML5 specification that will support cryptography for web applications.<ref name="ref_f71b557b">[https://www.admin-magazine.com/Articles/Web-Cryptography-API Secrets and Keys]</ref> | ||
+ | # The W3C proposal for the Web Cryptography API goes by the name of Encrypted Media Extensions (EME) and is currently in the draft phase.<ref name="ref_f71b557b" /> | ||
+ | # Implementation of the Web Cryptography API in the Chrome browser, and in Mozilla Firefox has already begun.<ref name="ref_f71b557b" /> | ||
+ | # Although PolyCrypt implements an older design of the Web Cryptography API, it is well suited for demonstration purposes.<ref name="ref_f71b557b" /> | ||
+ | # The goal of this series of blog articles is to evaluate the Web Cryptography specification before analysing the Web Cryptography API.<ref name="ref_9629a0f3">[https://www.inovex.de/blog/web-cryptography-api-part-1/ The Web Cryptography API: Do not Trust Anybody! [Part 1]]</ref> | ||
+ | # To address these problems, the Web Cryptography Working Group of the World Wide Web Consortium convened to perform client-side cryptographic operations in the native implementation of the user agent.<ref name="ref_9629a0f3" /> | ||
+ | # Until fairly recently, browsers did not have any built-in cryptography APIs, leading to a large number of JavaScript libraries that implemented cryptography for web applications.<ref name="ref_cce6a737">[https://developer.ibm.com/languages/javascript/articles/secure-javascript-applications-with-web-crypto-api/ Securing JavaScript applications with the Web Cryptography API]</ref> | ||
+ | # These features, whether provided through the Web Cryptography API or through the Node.js crypto module, are often referred to as “cryptographic primitives”.<ref name="ref_cce6a737" /> | ||
+ | # The Web Cryptography API uses instances of the ArrayBuffer class to represent byte sequences, but most functions also accept any TypedArray as their input.<ref name="ref_cce6a737" /> | ||
+ | # Unlike many other cryptographic libraries, the Web Crypto API enforces some usage patterns of keys that correlate to known best practices in cryptography.<ref name="ref_cce6a737" /> | ||
+ | # This example is provided to illustrate how to use the W3C Web Cryptography API to perform symmetric encryption inside a web browser.<ref name="ref_93f73baf">[https://github.com/infotechinc/symmetric-encryption-in-browser infotechinc/symmetric-encryption-in-browser: How to use the Web Cryptography API]</ref> | ||
+ | # Using this example requires a web browser that implements a compatible version of the Web Cryptography API.<ref name="ref_93f73baf" /> | ||
+ | # However, through 20+ years of history of web browsers, we're at the stage where in-browser cryptography is still problematic, and best you can rely on is SSL.<ref name="ref_48fe3b77">[https://www.cossacklabs.com/blog/whats-wrong-with-web-crypto.html What is Wrong with Modern Web Cryptography]</ref> | ||
+ | # In the next weeks, we'll summarize our experience of developing cryptography for Google Chrome, porting LibreSSL, building Themis for PNaCl, etc.<ref name="ref_48fe3b77" /> | ||
+ | # Server-Gated Cryptography (SGC), also known as International Step-Up by Netscape, is a defunct mechanism that was used to step up from 40-bit or 56-bit to 128-bit cipher suites with SSL.<ref name="ref_158869bc">[https://en.wikipedia.org/wiki/Server-Gated_Cryptography Server-Gated Cryptography]</ref> | ||
+ | # Although the weaker exported browsers would only include weaker ciphers in its initial SSL handshake, the browser also contained stronger cryptography algorithms.<ref name="ref_158869bc" /> | ||
+ | # Cryptography, the art and science of secret codes, has evolved dramatically over the centuries, especially since World War II.<ref name="ref_a35472c8">[https://www.pbs.org/wgbh/nova/decoding/web.html Are Web Transactions Safe?]</ref> | ||
+ | # Public-key cryptography provides a safe and easy way for the SSL software to share a secret key between your browser and a Web site you visit.<ref name="ref_a35472c8" /> | ||
+ | # The latest effort underway is to implement support for the Web Cryptography API.<ref name="ref_dce766ac">[https://www.nearform.com/blog/implementing-the-web-cryptography-api-for-node-js-core/ Implementing the Web Cryptography API for Node.js Core]</ref> | ||
+ | # API is a collection of W3C standardised cryptography primitives defined in the Web Cryptography API specification.<ref name="ref_dce766ac" /> | ||
+ | # The Web Cryptography API implementation has landed as an experimental feature in Node.js 15.0.0.<ref name="ref_dce766ac" /> | ||
+ | # A better implementation would be to derive users' crypto keys from their passwords using a key derivation algorithm like PBKDF2 (available via the Web Cryptography API) with a high work factor.<ref name="ref_08ee5467">[https://security.stackexchange.com/questions/173620/what-s-wrong-with-in-browser-cryptography-in-2017 What’s wrong with in-browser cryptography in 2017?]</ref> | ||
+ | # Cryptography is the cornerstone of information security, including various aspects such as data confidentiality, data integrity, authentication, and non-repudiation.<ref name="ref_0b824d46">[https://webkit.org/blog/7790/update-on-web-cryptography/ Update on Web Cryptography]</ref> | ||
+ | # The WebCrypto API was created to bring these important high-level cryptography capabilities to the web.<ref name="ref_0b824d46" /> | ||
+ | # This blog post first talks about the advantages of implementing web cryptography through native APIs, and then introduces an overview of the WebCrypto API itself.<ref name="ref_0b824d46" /> | ||
+ | # Long before the WebCrypto API was standardized, several JavaScript cryptography libraries were created and have successfully served the open web since.<ref name="ref_0b824d46" /> | ||
+ | # Asymmetric encryption (or public-key cryptography) uses a separate key for encryption and decryption.<ref name="ref_95810880">[https://www.digicert.com/faq/ssl-cryptography.htm All about SSL Cryptography]</ref> | ||
+ | # Elliptic curve cryptography (ECC) relies on the algebraic structure of elliptic curves over finite fields.<ref name="ref_95810880" /> | ||
+ | # Let's take a little aside to talk about a neat property of elliptic curve cryptography.<ref name="ref_597e9ebf">[https://developers.google.com/web/updates/2016/03/web-push-encryption Web Push Payload Encryption]</ref> | ||
+ | ===소스=== | ||
+ | <references /> |
2020년 12월 21일 (월) 17:44 기준 최신판
개요
- 암호학은 정보를 의도하지 않은 수신자가 이해할 수 없는 형태로 변환하여 정보를 안전하게 유지하는 과학이다.
- 암호학은 현대의 통신환경에서 필수적이다.
- 공개 키 암호화는 모든 시민에게 강력한 암호화를 사용할 수 있게 해주는 기술이다.
메모
- Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.org/abs/1508.01375.
노트
- In all cases, cryptography, the coding enabling information to be kept secret, was flawed or missing.[1]
- For years online security has focused on hard technical problems: Fixing software bugs or concealing data with cryptography.[1]
- When you hear the word "cryptography," your brain probably jumps to someone sitting in a dark room staring at lines of code.[2]
- Secret key cryptography uses one key across both the sending encryption and the receiver's decryption.[2]
- Public Key Cryptography allows for the use of two keys, which are different for the sender and receiver.[2]
- Drawing back to the question at hand, what is cryptography, the answer is fairly simple.[2]
- Asymmetric encryption (or public-key cryptography) uses a separate key for encryption and decryption.[3]
- Today, cryptography is used to protect digital data.[4]
- An example of basic cryptography is a encrypted message in which letters are replaced with other characters.[4]
- Therefore, modern cryptography involves developing encryption methods that are difficult for even supercomputers to break.[4]
- The OECD Recommendation Concerning Guidelines for Cryptography Policy were adopted on 27 March 1997.[5]
- However, the widespread use of cryptography raises a number of important issues.[5]
- Traditionally, cryptography was most often used only by governments.[5]
- Effective cryptography is an essential tool in a network environment for addressing these concerns.[5]
- Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical.[6]
- A key tool to secure the confidentiality of electronic communications is encryption or cryptography.[7]
- In other words cryptography can be used as an electronic signature.[7]
- Public-key cryptography is typically based on mathematical problems that are relatively easy to perform but cannot be easily reversed.[8]
- "The Joy of Cryptography" is a silly title, but all the sensible titles were already taken.[9]
- It was at least better than "You Can't Spell Cryptography without Cry".[9]
- Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it.[10]
- Public key cryptography adds a very significant benefit - it can serve to authenticate a source (e.g. a digital signature).[10]
- Public key cryptography was invented by Whitfield Diffie and Martin Hellman in 1975.[10]
- Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm.[11]
- TripleDESCng Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.[11]
- The second phase, the mechanization of cryptography, began shortly after World War I and continues even today.[12]
- It is tempting to equate this phase with the appearance of public-key cryptography, but that is too narrow a view.[12]
- It could be said that cryptography, or the art of secret writing, was born with writing itself.[13]
- The world we know today would be impossible without cryptography.[13]
- For this reason, public-key cryptography is also known as asymmetric cryptography.[13]
- None of these marvels would be possible without cryptography.[13]
- As of Android 9 (API level 28), the Crypto Java Cryptography Architecture (JCA) provider has been removed.[14]
- Public key encryption is a technological revolution offering every citizen the opportunity to use robust cryptography.[15]
- Cryptography techniques Cryptography is closely related to the disciplines of cryptology and cryptanalysis.[16]
- However, cryptography makes it harder for attackers to access messages and data protected by encryption algorithms.[16]
- Cryptography is the science of keeping information secure by transforming it into form that unintended recipients cannot understand.[17]
- Encryption is an important part of cryptography, but doesn't encompass the entire science.[17]
- For most of history, cryptography consisted of various substitution ciphers deployed to keep government and military communications secure.[17]
- In fact, the development of computers and advances in cryptography went hand in hand.[17]
- Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa.[18]
- Symmetric-key Cryptography: Both the sender and receiver share a single key.[18]
- In Public-Key Cryptography two related keys (public and private key) are used.[18]
- With symmetric cryptography, the same key is used for both encryption and decryption.[19]
- Prior to the early 20th century, cryptography was mainly concerned with linguistic and lexicographic patterns.[20]
- Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.[20]
- Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970s.[20]
- Since then, cryptography has become a widely used tool in communications, computer networks, and computer security generally.[20]
- But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.[21]
- The second is to provide some real examples of cryptography in use today.[21]
- It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications.[21]
- In cryptography, we start with the unencrypted data, referred to as plaintext.[21]
- Cryptography deals with the actual securing of digital data.[22]
- The primary objective of using cryptography is to provide the following four fundamental information security services.[22]
- Cryptography may also refer to the art of cryptanalysis, by which cryptographic codes are broken.[23]
- Collectively, the science of secure and secret communications, involving both cryptography and cryptanalysis, is known as cryptology.[23]
- The principles of cryptography are today applied to the encryption of fax, television, and computer network communications.[23]
- This Edureka video about what is Cryptography and why it is essential to protect the information shared across the internet.[24]
- That’s where Encryption or Cryptography comes in.[24]
- Further drilling down, Classical Cryptography is divided into Transposition Cipher and Substitution Cipher.[24]
- cryptography is a package which provides cryptographic recipes and primitives to Python developers.[25]
- In this segment, we'll discuss the fundamental concepts behind modern cryptography.[26]
- Asymmetric keys and symmetric keys are two basic types of algorithms that are used in modern cryptography.[26]
- In addition, cryptography also covers the obfuscation of information in images using techniques such as microdots or merging.[27]
- When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.[27]
- In public key cryptography, we use a public and a private key.[28]
- In general, cryptography provides us with a mechanism to protect data at rest, in motion, and, to a certain extent, in use.[28]
- Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.[29]
소스
- ↑ 1.0 1.1 Definition of Cryptography by Merriam-Webster
- ↑ 2.0 2.1 2.2 2.3 What is Cryptography?
- ↑ All about SSL Cryptography
- ↑ 4.0 4.1 4.2 Cryptography Definition
- ↑ 5.0 5.1 5.2 5.3 OECD Guidelines for Cryptography Policy
- ↑ Barcodes Inc.
- ↑ 7.0 7.1 meaning in the Cambridge English Dictionary
- ↑ AWS cryptography services
- ↑ 9.0 9.1 The Joy of Cryptography
- ↑ 10.0 10.1 10.2 Cryptography Defined
- ↑ 11.0 11.1 System.Security.Cryptography Namespace
- ↑ 12.0 12.1 Cryptology - History of cryptology
- ↑ 13.0 13.1 13.2 13.3 Cryptography: if it didn’t exist, we would have to invent it
- ↑ Android Developers
- ↑ Cryptography
- ↑ 16.0 16.1 Definition from WhatIs.com
- ↑ 17.0 17.1 17.2 17.3 What is cryptography? How algorithms keep information secret and safe
- ↑ 18.0 18.1 18.2 What is Cryptography? Definition of Cryptography, Cryptography Meaning
- ↑ What Is Cryptography and How Does It Work?
- ↑ 20.0 20.1 20.2 20.3 Cryptography
- ↑ 21.0 21.1 21.2 21.3 An Overview of Cryptography
- ↑ 22.0 22.1 Modern Cryptography
- ↑ 23.0 23.1 23.2 Cryptography
- ↑ 24.0 24.1 24.2 Cryptographic Algorithms
- ↑ cryptography
- ↑ 26.0 26.1 Technical Training
- ↑ 27.0 27.1 What is Cryptography?
- ↑ 28.0 28.1 Cryptography - an overview
- ↑ System.Security.Cryptography 네임스페이스
웹 브라우저
말뭉치
- If you’re reading this, then I hope that sometime somebody or some web site told you that doing cryptography in a web browser is a bad idea.[1]
- Why not put cryptography in the browser?[1]
- What we see happening here is cryptography being used to protect the web site’s interests, not the user’s.[1]
- For example, there are cryptography libraries that exist in both Java and Flash.[2]
- There are two main criticisms of doing cryptography in JavaScript: security and speed.[2]
- For example, the post makes the point that Math.random() is not a good source of randomness, and thus it is impossible to get a suitable amount of random numbers for cryptography.[2]
- Until recently, JavaScript has been too slow to perform the many complex computations required for secure cryptography.[2]
- The Console uses browser cryptography both during authentication and to protect stored values the server is not meant to see.[3]
- It does mean you’re following best practices and making solid steps towards a stable, secure website and can more safely use tools like browser cryptography on modern browsers.[3]
- Such an infrastructure would not only be useful for integrity checking cryptography code, but could be used to mitigate XSS attacks.[4]
- The Web Cryptography API is a proposed addition to the HTML5 specification that will support cryptography for web applications.[5]
- The W3C proposal for the Web Cryptography API goes by the name of Encrypted Media Extensions (EME) and is currently in the draft phase.[5]
- Implementation of the Web Cryptography API in the Chrome browser, and in Mozilla Firefox has already begun.[5]
- Although PolyCrypt implements an older design of the Web Cryptography API, it is well suited for demonstration purposes.[5]
- The goal of this series of blog articles is to evaluate the Web Cryptography specification before analysing the Web Cryptography API.[6]
- To address these problems, the Web Cryptography Working Group of the World Wide Web Consortium convened to perform client-side cryptographic operations in the native implementation of the user agent.[6]
- Until fairly recently, browsers did not have any built-in cryptography APIs, leading to a large number of JavaScript libraries that implemented cryptography for web applications.[7]
- These features, whether provided through the Web Cryptography API or through the Node.js crypto module, are often referred to as “cryptographic primitives”.[7]
- The Web Cryptography API uses instances of the ArrayBuffer class to represent byte sequences, but most functions also accept any TypedArray as their input.[7]
- Unlike many other cryptographic libraries, the Web Crypto API enforces some usage patterns of keys that correlate to known best practices in cryptography.[7]
- This example is provided to illustrate how to use the W3C Web Cryptography API to perform symmetric encryption inside a web browser.[8]
- Using this example requires a web browser that implements a compatible version of the Web Cryptography API.[8]
- However, through 20+ years of history of web browsers, we're at the stage where in-browser cryptography is still problematic, and best you can rely on is SSL.[9]
- In the next weeks, we'll summarize our experience of developing cryptography for Google Chrome, porting LibreSSL, building Themis for PNaCl, etc.[9]
- Server-Gated Cryptography (SGC), also known as International Step-Up by Netscape, is a defunct mechanism that was used to step up from 40-bit or 56-bit to 128-bit cipher suites with SSL.[10]
- Although the weaker exported browsers would only include weaker ciphers in its initial SSL handshake, the browser also contained stronger cryptography algorithms.[10]
- Cryptography, the art and science of secret codes, has evolved dramatically over the centuries, especially since World War II.[11]
- Public-key cryptography provides a safe and easy way for the SSL software to share a secret key between your browser and a Web site you visit.[11]
- The latest effort underway is to implement support for the Web Cryptography API.[12]
- API is a collection of W3C standardised cryptography primitives defined in the Web Cryptography API specification.[12]
- The Web Cryptography API implementation has landed as an experimental feature in Node.js 15.0.0.[12]
- A better implementation would be to derive users' crypto keys from their passwords using a key derivation algorithm like PBKDF2 (available via the Web Cryptography API) with a high work factor.[13]
- Cryptography is the cornerstone of information security, including various aspects such as data confidentiality, data integrity, authentication, and non-repudiation.[14]
- The WebCrypto API was created to bring these important high-level cryptography capabilities to the web.[14]
- This blog post first talks about the advantages of implementing web cryptography through native APIs, and then introduces an overview of the WebCrypto API itself.[14]
- Long before the WebCrypto API was standardized, several JavaScript cryptography libraries were created and have successfully served the open web since.[14]
- Asymmetric encryption (or public-key cryptography) uses a separate key for encryption and decryption.[15]
- Elliptic curve cryptography (ECC) relies on the algebraic structure of elliptic curves over finite fields.[15]
- Let's take a little aside to talk about a neat property of elliptic curve cryptography.[16]
소스
- ↑ 1.0 1.1 1.2 What’s wrong with in-browser cryptography?
- ↑ 2.0 2.1 2.2 2.3 Cryptography in the Browser
- ↑ 3.0 3.1 Making Browser Crypto Safe for the Modern Web
- ↑ Web Browser Cryptography is a Good Thing
- ↑ 5.0 5.1 5.2 5.3 Secrets and Keys
- ↑ 6.0 6.1 The Web Cryptography API: Do not Trust Anybody! [Part 1]
- ↑ 7.0 7.1 7.2 7.3 Securing JavaScript applications with the Web Cryptography API
- ↑ 8.0 8.1 infotechinc/symmetric-encryption-in-browser: How to use the Web Cryptography API
- ↑ 9.0 9.1 What is Wrong with Modern Web Cryptography
- ↑ 10.0 10.1 Server-Gated Cryptography
- ↑ 11.0 11.1 Are Web Transactions Safe?
- ↑ 12.0 12.1 12.2 Implementing the Web Cryptography API for Node.js Core
- ↑ What’s wrong with in-browser cryptography in 2017?
- ↑ 14.0 14.1 14.2 14.3 Update on Web Cryptography
- ↑ 15.0 15.1 All about SSL Cryptography
- ↑ Web Push Payload Encryption