Cryptography

Overview

Cryptography is the use of algorithms to hide information. These algorithms, or ciphers, involve a series of steps that turn readable plaintext into unreadable ciphertext, which can only be revealed with knowledge of the decryption key. Historically used to protect messages, such as military secrets, from unauthorized parties, modern cryptographic methods encrypt and secure almost all data, including banking transactions, medical records, and web traffic.

1440 Findings

Hours of research by our editors, distilled into minutes of clarity.

  • The science of cryptography, including methods to encrypt data and how to break encryption

    Monoalphabetic ciphers use a set of rules to replace each letter with another consistently, making them susceptible to brute force attacks that try every kind of replacement. While more complex ciphers can transform text in less obvious ways, because certain letters are used more often than others, an analysis of letter frequency may reveal patterns that help uncover the rules that make up a cipher.

  • A look at historical cryptography, from the Spartan 'scytale' to the Navajo Code Talkers

    From the Greek word for "hidden writing," scytales were batons around which a long strip of leather or parchment was wrapped before messages were written. Recipients needed a scytale of the correct width to encircle received ribbons and reveal the message. Members of the Navajo Nation created a code that remained unbroken throughout its use in World War II.

  • Watch how the Enigma machine encrypts messages and learn about its critical design flaw

    Using settings selected from a series of rotors and a plugboard that let operators swap letters with any of their choosing, the machine lit up the output letter for each letter typed. While this system could generate messages requiring any of 150 quintillion potential keys, the machine's reflector never encrypted a letter as itself, providing an entry point for exploiting the system.

  • View how AES—the global standard for symmetric encryption—works

    Established by the National Institute of Standards and Technology in 2001, the protocol transforms plaintext into ciphertext using multiple rounds of processing, including substitution, transposition, and mixing. Larger keys undergo more rounds to produce 16-byte blocks of scrambled data, with 256-bit AES keys taking 3.31 × 10⁵⁶ years to decrypt via brute force.

  • A mathematical breakdown of how RSA encryption uses prime numbers to encrypt data

    This form of asymmetric cryptography uses mathematical functions that rely on the product of two large prime numbers. Because traditional computers struggle to factor such products, obtaining the private keys needed to decrypt messages becomes effectively impossible. This security can be reinforced with larger prime numbers, though this makes encryption more computationally taxing.

  • The mathematics of quantum-based cryptography, and why data is already at risk

    Seeing the potential of this technology, some governments and malicious actors have already started storing encrypted data, in the hopes that quantum computers within the next 10 to 20 years will be able to decrypt it. As of 2022, the National Institute of Standards and Technology has selected four algorithms for inclusion in a quantum-resistant encryption standard.

  • Understanding the Diffie-Hellman key exchange, an example of public key cryptography

    Published in 1977 by Whitfield Diffie and Martin Hellman, the system involves two parties combining each of their unique private keys with a public key using a mathematical function. The combinations are exchanged and mixed to establish a common key to third party can determine. The Diffie-Hellman system underlies the encryption protocols for internet traffic.

Explore Science & Technology

Dive into the dynamic world of science and technology, where curiosity has brought about extraordinary understandings of the universe and creativity has led to the breakthroughs and innovations that have transformed our world. Explore a wide range of topics, from the natural and physical sciences to cutting-edge technologies and the people who shaped them, each of which is accompanied by carefully curated resources meant to inform, engage, and inspire those eager to uncover the nature of reality.

View All Science & Technology