Explanatory dictionaries give us close to each othersemantic definitions of the term "cryptography", differing only in the spheres of its application. Cryptography is the science of ways to protect information through various methods when it is necessary to restrict the power to familiarize with it and use it.
Cryptographic methods of information protection aretransformation of information for further transfer to an authorized person. The principle of these methods is as follows. The primary public message is encrypted, taking the form of a closed text or graphic image, called a ciphertext. Further, the cipher message is transmitted over a secure or unprotected data transmission channel to the receiving point. An authorized user performs an inverse transformation or decryption of the received message and receives the original plain text. Thus, an unauthorized person who has intercepted the encryptiongram will not be able to read it without knowing what cryptographic methods of information protection were used in encryption.
In cryptography, the concept of a key is often used,which allows you to draw a parallel between the encrypted information and the coding system. Cryptographic means of information protection use for the encryption and decryption a unique sequence of symbols, which is called a key. Thus, when using the same cryptographic cryptographic algorithm, the result depends on the key.
Keys by their classification are divided into:
The principle of the key pair is as follows: The private key is used to generate a public key, but can not be generated back by a known public key. This guarantees authentication verification when transferring information signed by an electronic digital signature (EDS).
Means of cryptographic protection of information,using asymmetric keys, are effective in encrypting transmitted, not stored information. Public keys are great for replacing a regular digital signature, which is widely used in Internet payment systems.
Cryptographic methods of information protection must meet the following requirements:
Cryptographic methods of information protectioncharacterized by the stability of the cipher, which is the main indicator of efficiency. This efficiency consists in the time or cost of the means required by the decryptor to obtain the original message from the encoded in the absence of the key. Provided there are no weak points in the encryption algorithms, which are quickly computed by the craftsmen, and a sufficiently reliable key length, these costs grow at times.
</ p>