1.2 CRYPTOGRAPHIC SYSTEMS

When a pair of users encipher the data they exchange over a network, the cryptographic transformation they use must be specific to the users. A cryptographic system is a family image = {Tk: k image} of cryptographic transformations. A key k is an identifier specifying a transformation Tk in the family image. The key space image is the totality of all key values. In some way the sender and receiver agree on a particular k and encipher their data with the enciphering transformation Tk.

Encipherment originally involved pen-and-pencil calculations. Mechanical devices were introduced to speed up encipherment in the eighteenth century, and they in turn were replaced by electromechanical devices a century later. Encipherment today is often implemented in software (Fig. 1.4); Tk is an algorithm whose input consists of plaintext x and key k and with ciphertext y as output.

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.