cryptography

listen to the pronunciation of cryptography
İngilizce - Türkçe
kriptografi

Günümüzde, kriptografi genellikle online iletişim ve işlemleri daha güvenli yapmak için kullanılır. - Nowadays, cryptography is often used to make online communications and transactions more secure.

şifreleme
(Askeri) KRİPTOGRAFİ: Çeşitli vasıta ve usullere göre bir anahtar kullanarak konuşma dili ile yazılmış açık metinlerin anlaşılmaz bir şekle sokulması ve bunların tekrar açık metin haline getirilmesi bilimi. Bu bilimin kriptoanalizden başka usullerle uygulanması
deşifre
cryptographer
kriptolog
cryptographer
(Askeri) KRİPTOCU: Haberleri kriptolayan, kriptolu haberleri açan veya bir kripto sisteminin tertibine iştirak eden kimse
cryptographically
kriptografik olarak
İngilizce - İngilizce
The discipline concerned with communication security (eg, confidentiality of messages, integrity of messages, sender authentication, non-repudiation of messages, and many other related issues), regardless of the used medium such as pencil and paper or computers

We might abate...the strange cryptography of Gaffarell in his Starrie Booke of Heaven.

{n} a secret kind of writing, cyphers
The science of keeping information secure
The discipline concerned with communication security (eg, confidentiality of messages, integrity of messages, sender authentication, non-repudiation of messages, and many other related issues)
The art of science concerning the principles, means, and methods for rendering plain text unintelligible and for converting encrypted messages into intelligible form
– The science of keeping information secure
The process of protecting information by transforming it into an unreadable format The information is encrypted using a Key, which makes the data unreadable, and is then decrypted later when the information needs to be used again See also Public Key Cryptography and Private Key Cryptography
The branch of cryptology which deals with the principles, means, and methods of designing and using cryptosystems
A process associated with scrambling plaintext (ordinary text, or cleartext) into ciphertext (a process called encryption), then back again (known as decryption) Cryptography concerns itself with four objectives: 1) Confidentiality (the information cannot be understood by anyone for whom it was unintended) 2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected) 3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information) 4) Authentication (the sender and receiver can confirm each other's identity and the origin/destination of the information) Procedures and protocols that meet some or all of the above criteria are known as cryptosystems
RSA calls it the science of using difficult problems to conceal information It is the study and use of methods designed to render information unintelligible Cryptography does not seek to hide the message, only the meaning of the message
act of writing in code or cipher
The art and science of keeping files and messages secure It works by mathematically transforming a plaintext (or cleartext) message into a disguised ciphertext, a process known as encryption Decryption involves turning the ciphertext back into plaintext The mathematical function used for encryption and decryption is called a cryptographic algorithm or cipher
The mathematical science used to secure the confidentiality and authentication of data by transforming data in order to hide its information content, prevent undetected modification, and/or prevent unauthorized use
Mathematical frameworks that employ special characteristics of large numbers to algorithmically add one or more of the following characteristics to messages: confidentiality (secrecy), authenticity (known author), integrity (no modifications), and non-repudiation (author cannot deny authorship)
The art and science of using mathematics to secure information and create a high degree of trust in the electronic realm See also public key, secret key, symmetric-key, and threshold cryptography
A field science involving the transmission of information in an encoded form so that only an intended recipient can decode the information and reveal its meaning Encoded information is commonly said to be encrypted
The discipline which embodies principles, means, and methods for the transformation of data in order to hide its information content, prevent its undetected modification and/or prevent its unauthorised use [ISO 7498-2: 1989] [ISO 8732: 1988]
The art and science of information security It provides four basic information security functions: confidentiality, integrity, authentication, and nonrepudiation See also confidentiality; integrity; authentication; nonrepudiation
The act or art of writing in secret characters; also, secret characters, or cipher
The process of scrambling and unscrambling information so that only the intended parties can read it For example, when you send your payment data over the Internet for a purchase, cryptography can prevent everyone but the intended merchant from reading your Visa account number and card expiration date
What is cryptography, and where can I find more information about it?
The mathematical science used to secure the confidentiality and authentication of data by replacing it with a transformed version that can be reconverted to reveal the original data only by someone holding the proper cryptographic algorithm and key A discipline that embodies the principles, means, and methods for transforming data in order to hide its information content, prevent its undetected modification, and/or prevent its unauthorized uses
The process of securing private information that is passed through public networks, by mathematically scrambling (i e encrypting) it in a way that makes it unreadable to anyone except the person or persons holding the mathematical "key" that can unscramble (decrypt) it The two most common types of cryptography are "same-key" and "public-key " In same-key cryptography, a message is encrypted and decrypted using the same key, which is passed along from one party to another in a separate transmission A more secure method is public-key cryptography which uses a pair of different keys (one public, one private) that have a particular relationship to one another, such that any message encrypted with one key can only be decrypted with the other key and vice-versa
the study of secret writing and codes. Practice of the enciphering and deciphering of messages in secret code in order to render them unintelligible to all but the intended receiver. Cryptography may also refer to the art of cryptanalysis, by which cryptographic codes are broken. Collectively, the science of secure and secret communications, involving both cryptography and cryptanalysis, is known as cryptology. The principles of cryptography are today applied to the encryption of fax, television, and computer network communications. In particular, the secure exchange of computer data is of great importance to banking, government, and commercial communications. See also data encryption
-A coding method in which data is encrypted (translated into an unreadable format) and then decrypted (translated back into a readable format by someone with a secret key) using an algorithm Cryptography is used to send or store information securely See public key cryptography
(i) The mathematical science used to secure the confidentiality and authentication of data by replacing it with a transformed version that can be reconverted to reveal the original data only by someone holding the proper cryptographic algorithm and key (ii) A discipline that embodies the principles, means, and methods for transforming data in order to hide its information content, prevent its undetected modification, and/or prevent its unauthorized uses
{i} writing or deciphering of secret codes
The discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification, or prevent its unauthorized use
Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available Information encrypted using one key can only be decrypted using the other, and vice versa The implication of this is that if a message can be decrypted using the public key, then it must have been sent from the owner of the private key
The science of using mathematics to make information secure See also: encryption
The study of techniques and applications to protect sensitive communications by encoding data so that it can only be decoded by specific individuals A system for encrypting and decrypting data is a cryptosystem These usually involve an algorithm for combining the original data ("plaintext") with one or more "keys" - numbers or strings of characters known only to the sender and/or recipient The resulting output is known as "ciphertext"
The study of codes, cryptography refers to the making and breaking of algorithms to conceal or otherwise encrypt information One of the most popular internet encryption schemes is PGP [Buy the Book]
the science of analyzing and deciphering codes and ciphers and cryptograms
asymmetric cryptography
cryptography in which the key used in decryption is different from that used for encryption

One advantage of asymmetric cryptography is that you can exchange data without sharing the ability to read it.

cryptography.
crypto
public key cryptography
The subfield of cryptography in which all information used to encode a message is assumed to be publicly available
cryptographer
decoder skilled in the analysis of codes and cryptograms
cryptographer
A person who is an expert on creating codes and cyphers. Someone who studies cryptology
cryptographer
One who writes in cipher, or secret characters
cryptographer
{i} writer or decoder of ciphered writing, writer or decoder of a code
cryptographically
in a cryptographic manner; using cryptography; for cryptographic purposes
cryptographically
in a cryptographic manner, by means of cryptography
cryptographically
in a cryptographic manner
cryptography

    Heceleme

    cryp·tog·ra·phy

    Telaffuz

    Etimoloji

    [ krip-'tä-gr&-fE ] (noun.) 1658. From crypto- + -graphy .