Encryption method

from Wikipedia, the free encyclopedia
The articles on encryption and encryption methods overlap thematically. Help me to better differentiate or merge the articles (→  instructions ) . To do this, take part in the relevant redundancy discussion . Please remove this module only after the redundancy has been completely processed and do not forget to include the relevant entry on the redundancy discussion page{{ Done | 1 = ~~~~}}to mark. OS ( discussion ) 06:18, 23 Apr 2015 (CEST)

With an encryption method a can plaintext into a ciphertext is converted ( encryption ) and vice versa of the ciphertext are reconverted back into the plaintext ( decryption ). A key is often used here . Cryptography has a long history, so encryption methods are already known from ancient Egypt . Important milestones in the development of new encryption methods are the invention of the telegraph , the computer and asymmetrical cryptosystemsThe most widespread method today due to digital communication is the RSA method .

principle

Encryption
Decryption

A source text, such as B. a message or a password can be encrypted. Such a source text is called plain text , the encrypted text is called ciphertext . In this way, the source text can be protected from unauthorized access. Despite this encryption, a third party, usually called a code breaker , can try to decipher the text that he cannot understand . In principle, one differentiates between the classic symmetrical cryptosystems and the asymmetrical cryptosystems that have only been known for a few decades .

Symmetrical encryption method

With symmetrical procedures, encryption and decryption are carried out with the same key. This means that the sender and recipient must have agreed on this secret key in advance and the key must of course be kept secret in order to protect the information . The transfer of the secret key represents a security problem. The first known of this type is the Caesar cipher .

Asymmetrical encryption method

With asymmetric methods, there is not one key to encrypt and decrypt, but two; a public key that is accessible to everyone and a private key that must be kept secret. The text is encrypted with the public key and can only be decrypted with the private key. The encryption key does not have to be kept secret here, but it must be ensured that the public key really belongs to the recipient. In addition, asymmetric methods are usually slower, which is why hybrid methods are mostly used in practice .

ID-based encryption method

ID-based encryption methods are a special subset of the asymmetric methods in which there is only one secret decryption key. Only the public parameters of the procedure and the identity of the recipient need to be known for encryption. The recipient can have a decryption key associated with his identity issued by a central authority that has a kind of superkey. The specialty of this procedure is that no key is transmitted any more, the encryption can even take place before the recipient knows his secret key.

See also

literature

Web links