# Encryption

**Encryption**is the process of converting information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge. This is usually done for secrecy, and typically for confidential communications. Encryption can ensure a good measure of confidentiality (secrecy), but may not be able to provide authentication. Even when encrypted, messages can be subject to traffic analysis.

Table of contents |

2 Ciphers vs codes 3 Types of cipher 4 See also |

## Ciphers

A**cipher**(sometimes spelt

**cypher**) is an algorithm for performing encryption (and the reverse,

**decryption**) — a series of well-defined steps that can be followed as a procedure. An alternative term is

**encipherment**. The original information is known as

*plaintext*, and the encrypted form as

**ciphertext**. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it; it should resemble random gibberish to those not intended to read it.

Ciphers are usually parameterised by a piece of auxillary information, called a key. The encrypting procedure is varied depending on the key which changes the detailed operation of the algorithm. Without the key, the cipher cannot be used to encrypt, or more importantly, to decrypt.

## Ciphers vs codes

In non-technical usage, a "cipher" is the same thing as a "(secret) code"; however, in technical discussions they are distinguished into two concepts: codes work at the level of meaning; that is, words or phrases are converted into something else, while ciphers work at a lower level: the level of individual letters, or small groups of letters — or in modern ciphers, individual bits. Some systems used both codes and ciphers in one system, using superencipherment to increase the security.
Historically, cryptography was split into a dichotomy of codes and ciphers, and coding had its own terminology, analagous to that for ciphers: "*encoding*, *codetext*, *decoding*" and so on. However, codes have a variety of drawbacks, including susceptibilty to cryptanalysis and the difficulty of managing a cumbersome codebook. Because of this, codes have fallen into disuse in modern cryptography, and ciphers are the dominant paradigm.

## Types of cipher

There are a variety of different types of encryption. Algorithms used earlier in the history of cryptography are substantially different to modern methods, and modern ciphers can be classified according to how they operate and whether they use one or two keys.Ciphers used in the past are known as classical ciphers. They include substitution ciphers and transposition ciphers. During the early 1900s, more sophisticated machines for encryption were used, termed rotor machines, which were more complex than previous schemes.

Encryption methods can be divided into symmetric key algorithms and asymmetric key algorithms. In a symmetric key algorithm (e.g., DES and AES), the sender and receiver must have a shared key set up in advance and kept secret from all other parties; the sender uses this key for encryption, and the receiver uses the same key for decryption. In an asymmetric key algorithm (e.g., RSA, and the most common use of PGP), there are two separate keys: a *public key* is published and enables any sender to perform encryption, while a *private key* is kept secret by the receiver and enables him to perform decryption.

Symmetric key ciphers can be distinguished into two types, depending on whether they work on blocks of symbols usually of a fixed size (*block ciphers*), or on a continuous stream of symbols (*stream ciphers*).