In
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, a cryptosystem is a suite of
cryptographic algorithm
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as pla ...
s needed to implement a particular security service, such as confidentiality (
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
).
Typically, a cryptosystem consists of three algorithms: one for
key generation
Key generation is the process of generating keys in cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.
A device or program used to generate keys is called a key generator or keygen.
Generation in crypt ...
, one for encryption, and one for decryption. The term ''
cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
'' (sometimes ''cypher'') is often used to refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the term ''cryptosystem'' is most often used when the key generation algorithm is important. For this reason, the term ''cryptosystem'' is commonly used to refer to
public key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
techniques; however both "cipher" and "cryptosystem" are used for
symmetric key techniques.
Formal definition
Mathematically, a cryptosystem or encryption scheme can be defined as a
tuple
In mathematics, a tuple is a finite sequence or ''ordered list'' of numbers or, more generally, mathematical objects, which are called the ''elements'' of the tuple. An -tuple is a tuple of elements, where is a non-negative integer. There is o ...
with the following properties.
#
is a set called the "plaintext space". Its elements are called plaintexts.
#
is a set called the "ciphertext space". Its elements are called ciphertexts.
#
is a set called the "key space". Its elements are called keys.
#
is a set of functions
. Its elements are called "encryption functions".
#
is a set of functions
. Its elements are called "decryption functions".
For each
, there is
such that
for all
.
Note; typically this definition is modified in order to distinguish an encryption scheme as being either a
symmetric-key or
public-key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
type of cryptosystem.
Examples
A classical example of a cryptosystem is the
Caesar cipher. A more contemporary example is the
RSA cryptosystem.
Another example of a cryptosystem is the
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES). AES is a widely used symmetric encryption algorithm that has become the standard for securing data in various applications.
Paillier cryptosystem
The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing ''n''-th residue classes is believed to be computationally difficult. Th ...
is another example used to preserve and maintain privacy and sensitive information. It is featured in electronic voting, electronic lotteries and electronic auctions.
See also
*
List of cryptosystems
A cryptosystem is a set of cryptographic algorithms that map ciphertexts and plaintexts to each other.
Private-key cryptosystems
Private-key cryptosystems use the same key for encryption and decryption.
* Caesar cipher
* Substitution ciph ...
*
Semantic security
In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ci ...
References
{{Authority control
Cryptography