|This article does not cite any references or sources. (June 2014)|
There are two different meanings of the word cryptosystem. One is the general meaning understood by the public, and the other meaning is that used by the cryptographic community.
In this meaning, the term cryptosystem is used as shorthand for "cryptographic system". A cryptographic system is any computer system that involves cryptography. Such systems include for instance, a system for secure electronic mail which might include methods for digital signatures, cryptographic hash functions, key management techniques, and so on. Cryptographic systems are made up of cryptographic primitives and are usually rather complex. Because of this, breaking a cryptosystem is not restricted to breaking the underlying cryptographic algorithms - usually it is far easier to break the system as a whole, e.g., through the not uncommon misconceptions of users in respect to the cryptosystem.The systematic arrangement of cypher text can abide the security.
Meaning in the context of cryptography
Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. The term cipher (sometimes cypher) is often used to refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the term "cryptosystem" is most often used when the key generation algorithm is important. For this reason, the term "cryptosystem" is commonly used to refer to public key techniques; however both "cipher" and "cryptosystem" are used for symmetric key techniques.
"Cryptographic system" vs. "cryptosystem"
The Internet Security Glossary RFC 2828 dissuades from using the term "cryptosystem", giving the following definitions.
- (D) ISDs SHOULD NOT use this term as an abbreviation for cryptographic system. (For rationale, see: crypto.)
- Except as part of certain long-established terms listed in this Glossary, ISDs SHOULD NOT use this abbreviated term because it may be misunderstood. Instead, use "cryptography" or "cryptographic".
|This cryptography-related article is a stub. You can help Wikipedia by expanding it.|