Glossary of Terms
A symmetric-key block cipher that applies the Data Encryption Standard (DES) algorithm three times to each data block (Encrypt-Decrypt-Encrypt sequence). Developed to improve DES security with a longer effective key length.
A symmetric-key block cipher standard adopted by the U.S. government. It uses key sizes of 128, 192, or 256 bits and encrypts data in 128-bit blocks through multiple rounds (10, 12, or 14 respectively). Widely used and considered very secure.
A type of cryptography that uses two separate but mathematically related keys: a public key (for encryption) and a private key (for decryption). Also known as public-key cryptography.
An encryption algorithm that processes input data in fixed-size blocks (e.g., 64-bit or 128-bit blocks) at a time, producing an output block for each input block. Examples: DES, AES, 3DES.
A cryptanalytic attack that involves trying every possible key on a piece of ciphertext until an intelligible plaintext is obtained. Feasibility depends on key space size.
A simple substitution cipher where each letter in the plaintext is shifted a certain fixed number of positions down the alphabet. Example: Shift 3 (A becomes D, B becomes E).
The algorithm used for transforming plaintext into ciphertext (encryption) and back (decryption).
The scrambled, unreadable message resulting from applying an encryption algorithm (cipher) to plaintext.
Older methods of encryption, typically operating on characters, including substitution and transposition techniques. Examples: Caesar, Playfair, Hill, Rail Fence.
The study and practice of analyzing information systems to understand hidden aspects, often focusing on finding weaknesses in cryptographic algorithms or breaking ciphers without knowing the key.
The science and study of techniques for secure communication in the presence of third parties (adversaries). Involves encryption, decryption, key management, etc.
The process of converting ciphertext back into its original plaintext form using a key and a decryption algorithm.
An outdated symmetric-key block cipher standard, officially retired in 2005. It uses a 56-bit effective key and operates on 64-bit blocks through 16 rounds of permutation and substitution.
The process of converting plaintext into ciphertext using a key and an encryption algorithm to make it unreadable to unauthorized parties.
A polygraphic substitution cipher based on linear algebra. It uses a matrix key to encrypt blocks of letters.
A piece of information (parameter) used by a cipher algorithm to transform plaintext into ciphertext or vice versa. In symmetric crypto, the same key is used for both; in asymmetric, different but related keys are used.
A substitution cipher where the cipher alphabet is fixed throughout the encryption process (each plaintext letter always maps to the same ciphertext letter). Vulnerable to frequency analysis.
The original, readable message or data before encryption.
A manual symmetric encryption technique that encrypts pairs of letters (digraphs), instead of single letters. It uses a 5x5 grid based on a keyword.
A substitution cipher that uses multiple substitution alphabets (e.g., based on a keyword), making it more resistant to frequency analysis than monoalphabetic ciphers. Example: Vigenère cipher.
A simple transposition cipher where plaintext is written downwards diagonally on successive "rails" of an imaginary fence and then read off as sequences of rows.
An educational simplified version of the DES algorithm, operating on 8-bit blocks with a 10-bit key and involving 2 rounds. Used to illustrate the principles of block ciphers.
An encryption algorithm that processes input data continuously, typically one bit or one byte at a time, producing one output element for each input element. Example: XOR cipher.
A method of encryption where units of plaintext (like letters or bits) are replaced with ciphertext units according to a defined system (the key).
A type of cryptography where the same secret key is used for both encryption and decryption. Requires secure key distribution.
A method of encryption where the positions of plaintext units (like letters) are shifted according to a regular system, rearranging the order but keeping the letters themselves unchanged.
A simple stream cipher technique where the plaintext is combined with a key using the bitwise XOR operation. Repeating the XOR operation with the same key decrypts the ciphertext.