faceted.wiki

Cryptography

Source: Wikipedia

Cryptography has evolved from simple letter-scrambling into a multi-disciplinary science that protects the four pillars of digital trust.

While ancient cryptography was almost exclusively about confidentiality (keeping secrets), modern applications focus on four distinct goals: confidentiality, data integrity (ensuring a message wasn't altered), authentication (verifying the sender's identity), and non-repudiation (preventing someone from denying they sent a message). This expansion has pulled the field out of the realm of simple linguistics and into the intersection of mathematics, computer science, electrical engineering, and physics.

Today, cryptography is the "invisible glue" of the global economy. It secures everything from chip-based payment cards and digital currencies to military communications and the passwords used to unlock your phone. Without these protocols, the public internet would be unusable for commerce or private interaction, as there would be no way to prevent third parties from reading or forging messages.

The shift from "security through obscurity" to "computational hardness" ensures that a system stays safe even when the enemy knows how it works.

Historically, people tried to keep their encryption methods secret. However, modern cryptography operates on Kerckhoffs’s Principle: a system should remain secure even if everything about it—except the secret key—is public knowledge. Claude Shannon, the father of information theory, famously restated this as "the enemy knows the system." If your security relies on your adversary not finding out how your algorithm works, your security is fragile and temporary.

Because of this, modern algorithms are designed around "computational hardness." They are mathematically structured so that while a message is theoretically breakable, doing so would require more computing power or time than currently exists in the universe. While "information-theoretically secure" systems like the one-time pad are unhackable even with infinite power, they are too cumbersome for daily use, making "computationally secure" math the practical standard.

Asymmetric encryption solved the "handshake problem," allowing strangers to communicate securely without ever meeting in secret.

Until the 1970s, all cryptography was "symmetric," meaning the sender and receiver used the exact same key to lock and unlock a message. This created a massive logistical hurdle: how do you get the key to the other person without an eavesdropper stealing it? If you have to meet in person to exchange a key, the speed of digital communication is neutralized.

The invention of asymmetric (or "public-key") cryptography changed this by using two different keys: a public key that anyone can see to encrypt a message, and a private key that only the recipient holds to decrypt it. In the modern world, asymmetric systems like RSA or Elliptic Curve Cryptography (ECC) are used to perform a "digital handshake" to exchange a temporary secret key, after which the system switches to faster symmetric encryption for the bulk of the data.

The dual-use nature of encryption has transformed a mathematical curiosity into a regulated weapon of national security.

Because cryptography is a powerful tool for espionage and sedition, many governments historically classified it as a "munition" or weapon. During the late 20th century, this led to strict export controls, where high-strength encryption software could not be legally shipped across certain borders. Even today, the "Crypto Wars" continue as governments seek "backdoors" to investigate crime, while privacy advocates argue that any backdoor for the police is a front door for hackers.

Beyond state secrets, cryptography is the primary battleground for digital rights management (DRM) and copyright. It is used to lock digital media to specific devices or users, leading to ongoing legal disputes over "fair use" and the right to bypass encryption for repair or archival. What began as a way for generals to talk to their troops has become a central tension in the definition of digital ownership and civil liberties.

13 images
Back Topics Next