{"id":2270,"date":"2014-03-21T11:00:21","date_gmt":"2014-03-21T15:00:21","guid":{"rendered":"http:\/\/sqlity.net\/en\/?p=2270"},"modified":"2014-11-13T13:10:47","modified_gmt":"2014-11-13T18:10:47","slug":"cryptographic-terminology","status":"publish","type":"post","link":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/","title":{"rendered":"Cryptographic Terminology &#8211; A Glossary"},"content":{"rendered":"<div>\n<div style=\"float:left; padding:20px;\">\n<iframe loading=\"lazy\" src=\"https:\/\/www.flickr.com\/photos\/64862813@N08\/7754498024\/player\/048c3959fa\" height=\"214\" width=\"320\"  frameborder=\"0\" ><\/iframe>\n<\/div>\n<h3>Introduction<\/h3>\n<p>\nWhen reading or hearing about cryptography and cryptology, unless you are a specialist in that field, you probably often encounter words and phrases that are somewhat foreign. With this post I am going to start a lose series of posts trying to explain one term at a time. Starting a series about cryptographic terminology, this post had to be about one cryptographic expression as well and I decided to take a look at the term Cryptography itself.\n<\/p>\n<p>\nThis post will also act as an anchor point, listing all the other posts in this series as they are written. With that, it will provide a form of Glossary that I am going to reference in later articles.\n<\/p>\n<h3>What is Cryptography?<\/h3>\n<p>\nCryptography has its origins in the Greek language. It is a compound word with these two parts:\n<\/p>\n<ul>\n<li><em>krupto<\/em>: I conceal<\/li>\n<li><em>grapho<\/em>: I write<\/li>\n<\/ul>\n<p>\nThat means cryptography is the art of writing concealed messages.\n<\/p>\n<p>\nNowadays, cryptography is a lot more than just hiding content. Cryptography has evolved into its own field of mathematics with a heavy influx into computer science and for the last few years even physics. The focus of cryptography is to find methods of transformation that are easy to execute but extremely hard to reverse unless you are holding or have access to some kind of secret, commonly referred to as a key.\n<\/p>\n<p>\nA method of transformation in this context really is an algorithm that takes some form of input, a text document for example, and produces some form of indecipherable output - an encrypted document. That the output is illegible is certainly not the only requirement. In most cases, there needs to be another algorithm that can turn this document back into its readable form. An algorithm (pair) that can turn a document into a scrambled form and then back is called a cryptographic algorithm or sometimes encryption algorithm. An algorithm is a good cryptographic algorithm, if it is more expensive for an attacker (not knowing the key) to reverse the scrambling than the knowledge of the unscrambled material is worth to the attacker.\n<\/p>\n<h3>Summary<\/h3>\n<p>\nCryptography is the art of hiding information. It is a field of mathematics and tries to develop algorithms that can scramble information in a way that it is easy for the intended audience to unscramble the message, but very hard for bystanders.\n<\/p>\n<h3>The Glossary<\/h3>\n<p>\nBelow is the list of cryptographic terms that I have already covered. I will update it with every new post, starting with this one.\n<\/p>\n<div class=\"wp-cpl-sc-wrap wp-cpl-sc-theme-4\">\n        <div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/\" title=\"Permalink to: Cryptographic Terminology - A Glossary\">Cryptographic Terminology &#8211; A Glossary<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2278\/symmetric-key\/\" title=\"Permalink to: Symmetric Key Encryption\">Symmetric Key Encryption<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/\" title=\"Permalink to: Asymmetric Key Encryption\">Asymmetric Key Encryption<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2297\/certificates\/\" title=\"Permalink to: Certificates and the Chain of Trust\">Certificates and the Chain of Trust<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2303\/cryptographic-hash\/\" title=\"Permalink to: Cryptographic Hash Functions\">Cryptographic Hash Functions<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<div class=\"wp-cpl-sc-post\">\n        <h2><a href=\"https:\/\/sqlity.net\/en\/2309\/salt\/\" title=\"Permalink to: Salt \u2013 Preventing Rainbow Attacks against Password Stores\">Salt \u2013 Preventing Rainbow Attacks against Password Stores<\/a><\/h2>\n            <div class=\"clear\"><\/div>\n<\/div>\n<\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cryptographic terminology can be sometimes somewhat &#8220;cryptic&#8221;. This post starts out a series to provide a glossary of cryptographic terms. Each post in this series will cover one cryptographic expression in detail.<\/p>\n<p> <a href=\"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/\">[more&#8230;]<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[139,32,29,5,34,27],"tags":[273,38,15],"class_list":["post-2270","post","type-post","status-publish","format-standard","hentry","category-cryptographic-terminology","category-cryptography","category-fundamentals","category-general","category-security","category-series","tag-cryptography","tag-security-2","tag-sql-server"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptographic Terminology - A Glossary - sqlity.net<\/title>\n<meta name=\"description\" content=\"Cryptographic terminology can be sometimes somewhat &quot;cryptic&quot;. This post provides a glossary of cryptographic terms, each linking to a detailed sub-post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptographic Terminology - A Glossary - sqlity.net\" \/>\n<meta property=\"og:description\" content=\"Cryptographic terminology can be sometimes somewhat &quot;cryptic&quot;. This post provides a glossary of cryptographic terms, each linking to a detailed sub-post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/\" \/>\n<meta property=\"og:site_name\" content=\"sqlity.net\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sqlity.net\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-21T15:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-13T18:10:47+00:00\" \/>\n<meta name=\"author\" content=\"Sebastian Meine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sqlity\" \/>\n<meta name=\"twitter:site\" content=\"@sqlity\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastian Meine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/\"},\"author\":{\"name\":\"Sebastian Meine\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\"},\"headline\":\"Cryptographic Terminology &#8211; A Glossary\",\"datePublished\":\"2014-03-21T15:00:21+00:00\",\"dateModified\":\"2014-11-13T18:10:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/\"},\"wordCount\":452,\"commentCount\":0,\"keywords\":[\"Cryptography\",\"security\",\"SQL Server\"],\"articleSection\":[\"Cryptographic Terminology\",\"Cryptography\",\"Fundamentals\",\"General\",\"Security\",\"Series\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/\",\"url\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/\",\"name\":\"Cryptographic Terminology - A Glossary - sqlity.net\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#website\"},\"datePublished\":\"2014-03-21T15:00:21+00:00\",\"dateModified\":\"2014-11-13T18:10:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\"},\"description\":\"Cryptographic terminology can be sometimes somewhat \\\"cryptic\\\". This post provides a glossary of cryptographic terms, each linking to a detailed sub-post.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2270\\\/cryptographic-terminology\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sqlity.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptographic Terminology &#8211; A Glossary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/sqlity.net\\\/en\\\/\",\"name\":\"sqlity.net\",\"description\":\"Quality for SQL\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sqlity.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\",\"name\":\"Sebastian Meine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"caption\":\"Sebastian Meine\"},\"sameAs\":[\"http:\\\/\\\/sqlity.net\",\"https:\\\/\\\/x.com\\\/sqlity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptographic Terminology - A Glossary - sqlity.net","description":"Cryptographic terminology can be sometimes somewhat \"cryptic\". This post provides a glossary of cryptographic terms, each linking to a detailed sub-post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/","og_locale":"en_US","og_type":"article","og_title":"Cryptographic Terminology - A Glossary - sqlity.net","og_description":"Cryptographic terminology can be sometimes somewhat \"cryptic\". This post provides a glossary of cryptographic terms, each linking to a detailed sub-post.","og_url":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/","og_site_name":"sqlity.net","article_publisher":"https:\/\/www.facebook.com\/sqlity.net","article_published_time":"2014-03-21T15:00:21+00:00","article_modified_time":"2014-11-13T18:10:47+00:00","author":"Sebastian Meine","twitter_card":"summary_large_image","twitter_creator":"@sqlity","twitter_site":"@sqlity","twitter_misc":{"Written by":"Sebastian Meine","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/#article","isPartOf":{"@id":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/"},"author":{"name":"Sebastian Meine","@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c"},"headline":"Cryptographic Terminology &#8211; A Glossary","datePublished":"2014-03-21T15:00:21+00:00","dateModified":"2014-11-13T18:10:47+00:00","mainEntityOfPage":{"@id":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/"},"wordCount":452,"commentCount":0,"keywords":["Cryptography","security","SQL Server"],"articleSection":["Cryptographic Terminology","Cryptography","Fundamentals","General","Security","Series"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/","url":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/","name":"Cryptographic Terminology - A Glossary - sqlity.net","isPartOf":{"@id":"https:\/\/sqlity.net\/en\/#website"},"datePublished":"2014-03-21T15:00:21+00:00","dateModified":"2014-11-13T18:10:47+00:00","author":{"@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c"},"description":"Cryptographic terminology can be sometimes somewhat \"cryptic\". This post provides a glossary of cryptographic terms, each linking to a detailed sub-post.","breadcrumb":{"@id":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sqlity.net\/en\/2270\/cryptographic-terminology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sqlity.net\/en\/"},{"@type":"ListItem","position":2,"name":"Cryptographic Terminology &#8211; A Glossary"}]},{"@type":"WebSite","@id":"https:\/\/sqlity.net\/en\/#website","url":"https:\/\/sqlity.net\/en\/","name":"sqlity.net","description":"Quality for SQL","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sqlity.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c","name":"Sebastian Meine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","caption":"Sebastian Meine"},"sameAs":["http:\/\/sqlity.net","https:\/\/x.com\/sqlity"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2wXuw-AC","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts\/2270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/comments?post=2270"}],"version-history":[{"count":0,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts\/2270\/revisions"}],"wp:attachment":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/media?parent=2270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/categories?post=2270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/tags?post=2270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}