Skip to main content Accessibility help
×
Hostname: page-component-76dd75c94c-x59qb Total loading time: 0 Render date: 2024-04-30T08:42:45.099Z Has data issue: false hasContentIssue false
This chapter is part of a book that is no longer available to purchase from Cambridge Core

8 - Cryptology and chaos

Marwan Al-Akaidi
Affiliation:
De Montfort University, Leicester
Get access

Summary

Introduction

Modern information security manifests itself in many ways, according to the situation and its requirements. It deals with such concepts as confidentiality, data integrity, access control, identification, authentication and authorization. Practical applications, closely related to information security, are private messaging, electronic money, online services and many others.

Cryptography is the study of mathematical techniques related to aspects of information security. The word is derived from the Greek kryptos, meaning hidden. Cryptography is closely related to the disciplines of cryptanalysis and cryptology. In simple words, cryptanalysis is the art of breaking cryptosystems, i.e. retrieving the original message without knowing the proper key or forging an electronic signature. Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms that underpin cryptography and cryptanalysis.

Cryptology is a branch of mathematical science describing an ideal world. It is the only instrument that allows the application of strict mathematical methods to design a cryptosystem and estimate its theoretical security. However, real security deals with complex systems involving human beings from the real world. Mathematical strength in a cryptographic algorithm is a necessary but not sufficient requirement for a system to be acceptably secure.

Moreover, in the ideal mathematical world, the cryptographic security of an object can be checked only by means of proving its resistance to various kinds of known attack. Practical security does not imply that the system is secure: other, unknown, types of attack may occur.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2004

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Cryptology and chaos
  • Marwan Al-Akaidi, De Montfort University, Leicester
  • Book: Fractal Speech Processing
  • Online publication: 06 July 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511754548.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Cryptology and chaos
  • Marwan Al-Akaidi, De Montfort University, Leicester
  • Book: Fractal Speech Processing
  • Online publication: 06 July 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511754548.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Cryptology and chaos
  • Marwan Al-Akaidi, De Montfort University, Leicester
  • Book: Fractal Speech Processing
  • Online publication: 06 July 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511754548.008
Available formats
×