next up previous
Next: 2.4 Substitution Ciphers Up: 2. Background: Encryption and Previous: 2.2 Hidden Information

   
2.3 Encryption and Decryption

Zounds! EGOP hid a secret message! How did they do that?

Both processes are required! Encryption provides privacy and protection for information, like messages proclaiming intentions to take over the world. But, what good is the ability to hide something if you can't find (``unhide'') it, and what good is the ability to unhide if nothing can be hidden?

To hide or unhide information, something must change the information. The set of rules for performing this transformation is called a key:

A cryptosystem consists of both the rules for encryption and the rules for decryption. That is, a cryptosystem is an encryption key together with the corresponding decryption key:

You might sometimes hear or see the term cracking, which means figuring out the unencrypted text from encrypted text without knowing the decryption key.1 Note that it suffices to find the decryption key: if you can figure out the decryption key, then you can use it to decrypt the encrypted text and thereby extract the unencrypted text.


next up previous
Next: 2.4 Substitution Ciphers Up: 2. Background: Encryption and Previous: 2.2 Hidden Information
Thomas Yan
2000-05-01