ABSTRACT

We begin our discussion by defining some terms that will

be used throughout the entry. The first term is encryption.

In simplest terms, encryption is the process of making

information unreadable by unauthorized persons. The pro-

cess may be manual, mechanical, or electronic, and the

core of this entry is to describe the many ways that the

encryption process takes place. Encryption is to be distin-

guished from message-hiding. Invisible inks, microdots,

and the like are the stuff of spy novels and are used in the

trade; however, we will not spend any time discussing

these techniques for hiding information. Fig. 1 shows a

conceptual version of an encryption system. It consists of a

sender and a receiver, a message (called the “plain text”),

the encrypted message (called the “cipher text”), and an

item called a “key.” The encryption process, which trans-

forms the plain text into the cipher text, may be thought of

as a “black box.” It takes inputs (the plain text and key) and

produces output (the cipher text). The messages may be

handwritten characters, electromechanical representations

as in a Teletype, strings of 1s and 0s as in a computer or

computer network, or even analog speech. The black box

will be provided with whatever input/output devices it

needs to operate; the insides, or cryptographic algorithm

will, generally, operate independently of the external

representation of the information.