"암호학"의 두 판 사이의 차이

수학노트
둘러보기로 가기 검색하러 가기
(새 문서: * Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.o...)
 
1번째 줄: 1번째 줄:
 +
==메모==
 
* Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.org/abs/1508.01375.
 
* Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.org/abs/1508.01375.
 +
 +
 +
== 노트 ==
 +
 +
* In all cases, cryptography, the coding enabling information to be kept secret, was flawed or missing.<ref name="ref_367a">[https://www.merriam-webster.com/dictionary/cryptography Definition of Cryptography by Merriam-Webster]</ref>
 +
* For years online security has focused on hard technical problems: Fixing software bugs or concealing data with cryptography.<ref name="ref_367a" />
 +
* When you hear the word "cryptography," your brain probably jumps to someone sitting in a dark room staring at lines of code.<ref name="ref_927f">[https://interestingengineering.com/what-is-cryptography What is Cryptography?]</ref>
 +
* Secret key cryptography uses one key across both the sending encryption and the receiver's decryption.<ref name="ref_927f" />
 +
* Public Key Cryptography allows for the use of two keys, which are different for the sender and receiver.<ref name="ref_927f" />
 +
* Drawing back to the question at hand, what is cryptography, the answer is fairly simple.<ref name="ref_927f" />
 +
* Asymmetric encryption (or public-key cryptography) uses a separate key for encryption and decryption.<ref name="ref_9581">[https://www.digicert.com/faq/ssl-cryptography.htm All about SSL Cryptography]</ref>
 +
* Today, cryptography is used to protect digital data.<ref name="ref_c0bd">[https://techterms.com/definition/cryptography Cryptography Definition]</ref>
 +
* An example of basic cryptography is a encrypted message in which letters are replaced with other characters.<ref name="ref_c0bd" />
 +
* Therefore, modern cryptography involves developing encryption methods that are difficult for even supercomputers to break.<ref name="ref_c0bd" />
 +
* The OECD Recommendation Concerning Guidelines for Cryptography Policy were adopted on 27 March 1997.<ref name="ref_aad4">[https://www.oecd.org/sti/ieconomy/guidelinesforcryptographypolicy.htm OECD Guidelines for Cryptography Policy]</ref>
 +
* However, the widespread use of cryptography raises a number of important issues.<ref name="ref_aad4" />
 +
* Traditionally, cryptography was most often used only by governments.<ref name="ref_aad4" />
 +
* Effective cryptography is an essential tool in a network environment for addressing these concerns.<ref name="ref_aad4" />
 +
* Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical.<ref name="ref_054d">[https://www.barcodesinc.com/articles/cryptography2.htm Barcodes Inc.]</ref>
 +
* A key tool to secure the confidentiality of electronic communications is encryption or cryptography.<ref name="ref_a35a">[https://dictionary.cambridge.org/dictionary/english/cryptography meaning in the Cambridge English Dictionary]</ref>
 +
* In other words cryptography can be used as an electronic signature.<ref name="ref_a35a" />
 +
* Public-key cryptography is typically based on mathematical problems that are relatively easy to perform but cannot be easily reversed.<ref name="ref_5cbe">[https://docs.aws.amazon.com/ko_kr/crypto/latest/userguide/concepts-algorithms.html AWS cryptography services]</ref>
 +
* "The Joy of Cryptography" is a silly title, but all the sensible titles were already taken.<ref name="ref_8947">[https://web.engr.oregonstate.edu/~rosulekm/crypto/ The Joy of Cryptography]</ref>
 +
* It was at least better than "You Can't Spell Cryptography without Cry".<ref name="ref_8947" />
 +
* Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it.<ref name="ref_bb58">[https://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/SSim/history.html Cryptography Defined]</ref>
 +
* Public key cryptography adds a very significant benefit - it can serve to authenticate a source (e.g. a digital signature).<ref name="ref_bb58" />
 +
* Public key cryptography was invented by Whitfield Diffie and Martin Hellman in 1975.<ref name="ref_bb58" />
 +
* Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm.<ref name="ref_4d87">[https://docs.microsoft.com/en-us/dotnet/api/system.security.cryptography System.Security.Cryptography Namespace]</ref>
 +
* TripleDESCng Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.<ref name="ref_4d87" />
 +
* The second phase, the mechanization of cryptography, began shortly after World War I and continues even today.<ref name="ref_1197">[https://www.britannica.com/topic/cryptology/History-of-cryptology Cryptology - History of cryptology]</ref>
 +
* It is tempting to equate this phase with the appearance of public-key cryptography, but that is too narrow a view.<ref name="ref_1197" />
 +
* It could be said that cryptography, or the art of secret writing, was born with writing itself.<ref name="ref_f499">[http://www.fgcsic.es/lychnos/en_en/articles/cryptography_if_it_didnt_exist_we_would_have_to_invent_it Cryptography: if it didn’t exist, we would have to invent it]</ref>
 +
* The world we know today would be impossible without cryptography.<ref name="ref_f499" />
 +
* For this reason, public-key cryptography is also known as asymmetric cryptography.<ref name="ref_f499" />
 +
* None of these marvels would be possible without cryptography.<ref name="ref_f499" />
 +
* As of Android 9 (API level 28), the Crypto Java Cryptography Architecture (JCA) provider has been removed.<ref name="ref_fb58">[https://developer.android.com/guide/topics/security/cryptography Android Developers]</ref>
 +
* Public key encryption is a technological revolution offering every citizen the opportunity to use robust cryptography.<ref name="ref_fb74">[https://www.cases.lu/knowhow/glossary/Cryptography.html Cryptography]</ref>
 +
* Cryptography techniques Cryptography is closely related to the disciplines of cryptology and cryptanalysis.<ref name="ref_785c">[https://searchsecurity.techtarget.com/definition/cryptography Definition from WhatIs.com]</ref>
 +
* However, cryptography makes it harder for attackers to access messages and data protected by encryption algorithms.<ref name="ref_785c" />
 +
* Cryptography is the science of keeping information secure by transforming it into form that unintended recipients cannot understand.<ref name="ref_3a93">[https://www.csoonline.com/article/3583976/what-is-cryptography-how-algorithms-keep-information-secret-and-safe.html What is cryptography? How algorithms keep information secret and safe]</ref>
 +
* Encryption is an important part of cryptography, but doesn't encompass the entire science.<ref name="ref_3a93" />
 +
* For most of history, cryptography consisted of various substitution ciphers deployed to keep government and military communications secure.<ref name="ref_3a93" />
 +
* In fact, the development of computers and advances in cryptography went hand in hand.<ref name="ref_3a93" />
 +
* Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa.<ref name="ref_87e0">[https://economictimes.indiatimes.com/definition/cryptography What is Cryptography? Definition of Cryptography, Cryptography Meaning]</ref>
 +
* Symmetric-key Cryptography: Both the sender and receiver share a single key.<ref name="ref_87e0" />
 +
* In Public-Key Cryptography two related keys (public and private key) are used.<ref name="ref_87e0" />
 +
* With symmetric cryptography, the same key is used for both encryption and decryption.<ref name="ref_fb62">[https://www.synopsys.com/glossary/what-is-cryptography.html What Is Cryptography and How Does It Work?]</ref>
 +
* Prior to the early 20th century, cryptography was mainly concerned with linguistic and lexicographic patterns.<ref name="ref_d7de">[https://en.wikipedia.org/wiki/Cryptography Cryptography]</ref>
 +
* Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.<ref name="ref_d7de" />
 +
* Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970s.<ref name="ref_d7de" />
 +
* Since then, cryptography has become a widely used tool in communications, computer networks, and computer security generally.<ref name="ref_d7de" />
 +
* But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.<ref name="ref_ec4d">[https://www.garykessler.net/library/crypto.html An Overview of Cryptography]</ref>
 +
* The second is to provide some real examples of cryptography in use today.<ref name="ref_ec4d" />
 +
* It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications.<ref name="ref_ec4d" />
 +
* In cryptography, we start with the unencrypted data, referred to as plaintext.<ref name="ref_ec4d" />
 +
* Cryptography deals with the actual securing of digital data.<ref name="ref_f770">[https://www.tutorialspoint.com/cryptography/modern_cryptography.htm Modern Cryptography]</ref>
 +
* The primary objective of using cryptography is to provide the following four fundamental information security services.<ref name="ref_f770" />
 +
* Cryptography may also refer to the art of cryptanalysis, by which cryptographic codes are broken.<ref name="ref_48d7">[https://www.britannica.com/topic/cryptography Cryptography]</ref>
 +
* Collectively, the science of secure and secret communications, involving both cryptography and cryptanalysis, is known as cryptology.<ref name="ref_48d7" />
 +
* The principles of cryptography are today applied to the encryption of fax, television, and computer network communications.<ref name="ref_48d7" />
 +
* This Edureka video about what is Cryptography and why it is essential to protect the information shared across the internet.<ref name="ref_e1d1">[https://www.edureka.co/blog/what-is-cryptography/ Cryptographic Algorithms]</ref>
 +
* That’s where Encryption or Cryptography comes in.<ref name="ref_e1d1" />
 +
* Further drilling down, Classical Cryptography is divided into Transposition Cipher and Substitution Cipher.<ref name="ref_e1d1" />
 +
* cryptography is a package which provides cryptographic recipes and primitives to Python developers.<ref name="ref_0402">[https://pypi.org/project/cryptography/ cryptography]</ref>
 +
* In this segment, we'll discuss the fundamental concepts behind modern cryptography.<ref name="ref_bb0d">[https://www.maximintegrated.com/en/design/technical-documents/tutorials/7/7254.html Technical Training]</ref>
 +
* Asymmetric keys and symmetric keys are two basic types of algorithms that are used in modern cryptography.<ref name="ref_bb0d" />
 +
* In addition, cryptography also covers the obfuscation of information in images using techniques such as microdots or merging.<ref name="ref_a240">[https://usa.kaspersky.com/resource-center/definitions/what-is-cryptography What is Cryptography?]</ref>
 +
* When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.<ref name="ref_a240" />
 +
* In public key cryptography, we use a public and a private key.<ref name="ref_602d">[https://www.sciencedirect.com/topics/computer-science/cryptography Cryptography - an overview]</ref>
 +
* In general, cryptography provides us with a mechanism to protect data at rest, in motion, and, to a certain extent, in use.<ref name="ref_602d" />
 +
* Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.<ref name="ref_c308">[https://docs.microsoft.com/ko-kr/dotnet/api/system.security.cryptography System.Security.Cryptography 네임스페이스]</ref>
 +
===소스===
 +
<references />

2020년 12월 21일 (월) 08:52 판

메모

  • Elias, Yara, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange. “Ring-LWE Cryptography for the Number Theorist.” arXiv:1508.01375 [cs, Math], August 6, 2015. http://arxiv.org/abs/1508.01375.


노트

  • In all cases, cryptography, the coding enabling information to be kept secret, was flawed or missing.[1]
  • For years online security has focused on hard technical problems: Fixing software bugs or concealing data with cryptography.[1]
  • When you hear the word "cryptography," your brain probably jumps to someone sitting in a dark room staring at lines of code.[2]
  • Secret key cryptography uses one key across both the sending encryption and the receiver's decryption.[2]
  • Public Key Cryptography allows for the use of two keys, which are different for the sender and receiver.[2]
  • Drawing back to the question at hand, what is cryptography, the answer is fairly simple.[2]
  • Asymmetric encryption (or public-key cryptography) uses a separate key for encryption and decryption.[3]
  • Today, cryptography is used to protect digital data.[4]
  • An example of basic cryptography is a encrypted message in which letters are replaced with other characters.[4]
  • Therefore, modern cryptography involves developing encryption methods that are difficult for even supercomputers to break.[4]
  • The OECD Recommendation Concerning Guidelines for Cryptography Policy were adopted on 27 March 1997.[5]
  • However, the widespread use of cryptography raises a number of important issues.[5]
  • Traditionally, cryptography was most often used only by governments.[5]
  • Effective cryptography is an essential tool in a network environment for addressing these concerns.[5]
  • Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical.[6]
  • A key tool to secure the confidentiality of electronic communications is encryption or cryptography.[7]
  • In other words cryptography can be used as an electronic signature.[7]
  • Public-key cryptography is typically based on mathematical problems that are relatively easy to perform but cannot be easily reversed.[8]
  • "The Joy of Cryptography" is a silly title, but all the sensible titles were already taken.[9]
  • It was at least better than "You Can't Spell Cryptography without Cry".[9]
  • Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it.[10]
  • Public key cryptography adds a very significant benefit - it can serve to authenticate a source (e.g. a digital signature).[10]
  • Public key cryptography was invented by Whitfield Diffie and Martin Hellman in 1975.[10]
  • Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm.[11]
  • TripleDESCng Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.[11]
  • The second phase, the mechanization of cryptography, began shortly after World War I and continues even today.[12]
  • It is tempting to equate this phase with the appearance of public-key cryptography, but that is too narrow a view.[12]
  • It could be said that cryptography, or the art of secret writing, was born with writing itself.[13]
  • The world we know today would be impossible without cryptography.[13]
  • For this reason, public-key cryptography is also known as asymmetric cryptography.[13]
  • None of these marvels would be possible without cryptography.[13]
  • As of Android 9 (API level 28), the Crypto Java Cryptography Architecture (JCA) provider has been removed.[14]
  • Public key encryption is a technological revolution offering every citizen the opportunity to use robust cryptography.[15]
  • Cryptography techniques Cryptography is closely related to the disciplines of cryptology and cryptanalysis.[16]
  • However, cryptography makes it harder for attackers to access messages and data protected by encryption algorithms.[16]
  • Cryptography is the science of keeping information secure by transforming it into form that unintended recipients cannot understand.[17]
  • Encryption is an important part of cryptography, but doesn't encompass the entire science.[17]
  • For most of history, cryptography consisted of various substitution ciphers deployed to keep government and military communications secure.[17]
  • In fact, the development of computers and advances in cryptography went hand in hand.[17]
  • Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa.[18]
  • Symmetric-key Cryptography: Both the sender and receiver share a single key.[18]
  • In Public-Key Cryptography two related keys (public and private key) are used.[18]
  • With symmetric cryptography, the same key is used for both encryption and decryption.[19]
  • Prior to the early 20th century, cryptography was mainly concerned with linguistic and lexicographic patterns.[20]
  • Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.[20]
  • Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970s.[20]
  • Since then, cryptography has become a widely used tool in communications, computer networks, and computer security generally.[20]
  • But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.[21]
  • The second is to provide some real examples of cryptography in use today.[21]
  • It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications.[21]
  • In cryptography, we start with the unencrypted data, referred to as plaintext.[21]
  • Cryptography deals with the actual securing of digital data.[22]
  • The primary objective of using cryptography is to provide the following four fundamental information security services.[22]
  • Cryptography may also refer to the art of cryptanalysis, by which cryptographic codes are broken.[23]
  • Collectively, the science of secure and secret communications, involving both cryptography and cryptanalysis, is known as cryptology.[23]
  • The principles of cryptography are today applied to the encryption of fax, television, and computer network communications.[23]
  • This Edureka video about what is Cryptography and why it is essential to protect the information shared across the internet.[24]
  • That’s where Encryption or Cryptography comes in.[24]
  • Further drilling down, Classical Cryptography is divided into Transposition Cipher and Substitution Cipher.[24]
  • cryptography is a package which provides cryptographic recipes and primitives to Python developers.[25]
  • In this segment, we'll discuss the fundamental concepts behind modern cryptography.[26]
  • Asymmetric keys and symmetric keys are two basic types of algorithms that are used in modern cryptography.[26]
  • In addition, cryptography also covers the obfuscation of information in images using techniques such as microdots or merging.[27]
  • When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.[27]
  • In public key cryptography, we use a public and a private key.[28]
  • In general, cryptography provides us with a mechanism to protect data at rest, in motion, and, to a certain extent, in use.[28]
  • Provides a Cryptography Next Generation (CNG) implementation of the Triple Data Encryption Standard (3DES) algorithm.[29]

소스