Jump to content

Cryptosystem: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Reverting possible vandalism by Robert,Wall.Delacruz to version by Salix alba. Report False Positive? Thanks, ClueBot NG. (3229571) (Bot)
No edit summary
Tags: Mobile edit Mobile web edit
Line 1: Line 1:
In cryptography, a '''cryptosystem''' is a suite of cryptographic [[algorithm]]s needed to implement a particular security service, most commonly for achieving confidentiality ([[encryption]]).<ref>{{cite book|last1=Menezes|first1=A.|last2=Oorschot|first2=P. van|last3=Vanstone|first3=S.|title=Handbook of Applied Cryptography|publisher=CRC Press|isbn=0-8493-8523-7|edition=5th}}</ref>
In cryptography, a '''cryptosystem''' is a suite of cryptographic [[algorithm]]s needed to implement a particular security service, most commonly for achieving confidentiality ([[encryption]]).<ref>{{cite book|last1=Menezes|first1=A.|last2=Oorschot|first2=P. van|last3=Vanstone|first3=S.|title=Handbook of Applied Cryptography|publisher=CRC Press|isbn=3480-7778-346|edition=5th}}</ref>


Typically, a cryptosystem consists of three algorithms: one for [[key generation]], one for encryption, and one for decryption. The term ''[[cipher]]'' (sometimes ''cypher'') is often used to refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the term ''cryptosystem'' is most often used when the key generation algorithm is important. For this reason, the term ''cryptosystem'' is commonly used to refer to [[public key cryptography|public key]] techniques; however both "cipher" and "cryptosystem" are used for [[Symmetric-key algorithm|symmetric key]] techniques.
Typically, a cryptosystem consists of three algorithms: one for [[key generation]], one for encryption, and one for decryption. The term ''[[cipher]]'' (sometimes ''cypher'') is often used to refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the term ''cryptosystem'' is most often used when the key generation algorithm is important. For this reason, the term ''cryptosystem'' is commonly used to refer to [[public key cryptography|public key]] techniques; however both "cipher" and "cryptosystem" are used for [[Symmetric-key algorithm|symmetric key]] techniques.

Revision as of 12:33, 12 January 2018

In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).[1]

Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. The term cipher (sometimes cypher) is often used to refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the term cryptosystem is most often used when the key generation algorithm is important. For this reason, the term cryptosystem is commonly used to refer to public key techniques; however both "cipher" and "cryptosystem" are used for symmetric key techniques.

Formal definition

Mathematically, a cryptosystem or encryption scheme can be defined as a tuple with the following properties.

  1. is a set called the "plaintext space". Its elements are called plaintexts.
  2. is a set called the "ciphertext space". Its elements are called ciphertexts.
  3. is a set called the "key space". Its elements are called keys.
  4. is a set of functions . Its elements are called "encryption functions".
  5. is a set of functions . Its elements are called "decryption functions".

For each , there is such that for all .[2]

Note; typically this definition is modified in order to distinguish an encryption scheme as being either a symmetric-key or public-key type of cryptosystem.

Examples

A classical example of a cryptosystem is the Caesar cipher. A more contemporary example is the RSA cryptosystem.

References

  1. ^ Menezes, A.; Oorschot, P. van; Vanstone, S. Handbook of Applied Cryptography (5th ed.). CRC Press. ISBN 3480-7778-346. {{cite book}}: Check |isbn= value: length (help)
  2. ^ Buchmann, Johannes A. Introduction to Cryptography (2nd ed.). Springer. ISBN 0-387-20756-2.