Home  

Random  

Nearby  



Log in  



Settings  



Donate  



About Wikipedia  

Disclaimers  



Wikipedia





Cryptosystem





Article  

Talk  



Language  

Watch  

Edit  





Incryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption).[1]

Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. The term cipher (sometimes cypher) is often used to refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the term cryptosystem is most often used when the key generation algorithm is important. For this reason, the term cryptosystem is commonly used to refer to public key techniques; however both "cipher" and "cryptosystem" are used for symmetric key techniques.

Formal definition

edit

Mathematically, a cryptosystem or encryption scheme can be defined as a tuple   with the following properties.

  1.   is a set called the "plaintext space". Its elements are called plaintexts.
  2.   is a set called the "ciphertext space". Its elements are called ciphertexts.
  3.   is a set called the "key space". Its elements are called keys.
  4.   is a set of functions  . Its elements are called "encryption functions".
  5.   is a set of functions  . Its elements are called "decryption functions".

For each  , there is   such that   for all  .[2]

Note; typically this definition is modified in order to distinguish an encryption scheme as being either a symmetric-keyorpublic-key type of cryptosystem.

Examples

edit

A classical example of a cryptosystem is the Caesar cipher. A more contemporary example is the RSA cryptosystem.

Another example of a cryptosystem is the Advanced Encryption Standard (AES). AES is a widely used symmetric encryption algorithm that has become the standard for securing data in various applications.

Pallier cryptosystem is another example used to preserve and maintain privacy and sensitive information. It is featured in electronic voting, electronic lotteries and electronic auctions.[3]

See also

edit

References

edit
  1. ^ Menezes, A.; Oorschot, P. van; Vanstone, S. (1997). Handbook of Applied Cryptography (5th ed.). CRC Press. ISBN 0-8493-8523-7.
  • ^ Buchmann, Johannes A. (13 July 2004). Introduction to Cryptography (2nd ed.). Springer. ISBN 0-387-20756-2.
  • ^ Xia, Z., Yang, X., Xiao, M., & He, D. (n.d.). Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry. In Information Security and Privacy (pp. 73–86). Springer International Publishing. https://doi.org/10.1007/978-3-319-40367-0_5

  • t
  • e

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Cryptosystem&oldid=1232428891"
     



    Last edited on 3 July 2024, at 17:52  





    Languages

     


    العربية
    Català
    Dansk
    Deutsch
    Español
    Euskara
    فارسی
    Français
    Italiano
    Latviešu
    Nederlands
    Norsk nynorsk
    Polski
    Português
    Русский
    Simple English
    Українська


     

    Wikipedia


    This page was last edited on 3 July 2024, at 17:52 (UTC).

    Content is available under CC BY-SA 4.0 unless otherwise noted.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Terms of Use

    Desktop