Global Trend Radar
Web: www.geeksforgeeks.org US web_search 2026-05-07 08:42

暗号とは何か?

原題: What is Cipher? - GeeksforGeeks

元記事を開く →

分析結果

カテゴリ
AI
重要度
54
トレンドスコア
18
要約
暗号は、情報を保護するためにデータを変換する技術です。主に、データの機密性、完全性、認証を確保するために使用されます。暗号化は、平文を暗号文に変換し、復号化によって元のデータに戻すプロセスです。暗号には対称鍵暗号と非対称鍵暗号の2種類があり、それぞれ異なる方法で鍵を使用します。暗号技術は、通信の安全性を高めるために重要な役割を果たしています。
キーワード
What is Cipher? - GeeksforGeeks Courses Tutorials Interview Prep CN Tutorial Interview Questions Quizzes Gate OSI Model TCP-IP Network Security COA TOC Compiler Design DBMS What is Cipher? Last Updated : 23 Jul, 2025 Ciphers are the most vital components of cryptography, as it is through them that the protection of information is made possible in the ever-growing digital environment. In the present generation, given the technological advancement especially in the field of communication, the aspect of security is critical. Cipher is used in securing financial transactions, protecting information, and maintaining the confidentiality of communication among many others. This article focuses on the concept of ciphers, their importance, categorization, and usage in cryptography. What is Cipher? A cipher is a technique that is used in transforming the readable data (plaintext) into coded data (ciphertext) and the other way round. The first step in converting regular text into an unrecognizable form is encryption and the process of converting the encoded text back into regular text is decryption. Ciphers are able to perform these transformation using keys; specific pieces of information. It guarantees that only the right person can get to the primary data. Cipher working Primary Terminologies Cipher: A method or a set of rules for performing encryption or decryption of information – a step by step process. Encryption: The transformation of plaintext to the ciphertext through the use of a cipher. Decryption: The act of moving from the encrypted text to the original text. Plaintext: The source or plain data or text that has to be converted into cipher text before sending it over a channel. Ciphertext: The coded message that cannot be comprehended in its original form without the usage of decryption. Key: An item of data that a cipher employs to engage in the conversion of plaintext into ciphertext and vice versa. How Ciphers Work? Ciphers work by rearranging readable information (plaintext) in another form of information called ciphertext by use of a process that is known as encryption and this involves use of a certain key. Shifting of the plaintext is controlled by this key which operates like a password. Decryption is the process of recuperating the initial text from the cipher-text, which can be done only having the right key. This entitles the information to be secured and released to the right personnel only. Various ciphers like substitution ciphers, transposition ciphers and the modern algorithms employed in the contemporary AES and RSA modes, employ these methods to perform the above transformation to improve security depending on the complexity of the key and the algorithm in use. What are Ciphers Used for? Ciphers have a wide range of applications across various fields to ensure the security and integrity of information: Secure Communications: Encryption of emails, instant messages, and VoIP convert messages to codes that cannot be understandable to an unauthorized person and thus allow only the target receiver to be able to read the message. Protect Financial Transactions: Secure Internet connection, which is applied in online banking and e-commerce, uses encryption to safeguard consumers’ private data and, in particular, their credit card numbers and other personal data, against scammers. Safeguard Data Storage: Encryption is applied for safeguard of data which is stored in devices, servers and even in cloud. This guarantees that even in cases where the disks on which data is stored are lost or mobile phone is stolen, the content of it cannot be accessed without the Decryption Key. Ensure Authentication: The authentication protocols entail the use of encryption to be able to identify the user and or devices. It also assist in avoiding fraudulent communications and transaction, thereby securing the communications from unauthorized access. Enable Secure Digital Signatures: Digital signals are implemented using encryption to reduce the reliability of documents and messages that are transmitted electronically. This makes sure that it has not been interfered with and that it is original from the source that has the information. Types of Ciphers Ciphers can be broadly classified into three categories: Among the types of ciphers there are substitution ciphers, transposition ciphers, and modern ciphers. 1. Substitution Ciphers Substitution ciphers involve replacing each member of the plaintext with another member which can be of the same set. One of the early examples of the substitution technique is the Caesar cipher that got its name from Julius Caesar, who allegedly employed it in his secret letters. Caesar Cipher The Caesar cipher is a substitution cipher where each letter in the plaintext is replaced by another letter shifted a fixed number of positions down the alphabet. Simple Substitution Cipher A simple substitution cipher is a technique in which each letter in the plain text is replaced with another letter. The key is the alphabet but in a random order. 2. Transposition Ciphers Transposition ciphers are those forms of ciphers that work on the principle of shifting the positions of the characters of the plaintext to create the ciphertext. While in substitution ciphers the actual letters are replaced, in transposition ciphers the letters’ positions are changed instead. Rail Fence Cipher In the Rail Fence Cipher, the plaintext is arranged in a manner of a zigzag pattern on the number of ‘rails’ and then read row-wise. Columnar Transposition Cipher In Columnar Transposition Cipher, the plaintext is written into rows under a certain key. The columns are then arranged in order of the key names by using the sort function. 3. Modern Ciphers Modern ciphers are far more sophisticated and are intended to offer better security as compared to the traditional ciphers. These are of two types, the symmetric key ciphers and the asymmetric or public key ciphers. Symmetric-Key Ciphers In symmetric key encryption, both the sender and the receiver use the same key for encryption and decryption respectively. The most famous example of a symmetric-key cipher is the Advanced Encryption Standard (AES). AES operates on a 128-bit data block and employees keys of 128, 192, or 256 bits. It is used in many security protocols widely. Asymmetric-Key Ciphers Asymmetric key encryption employs the usage of a pair of keys, one of which is private, and the other is public. The first one is for the encryption and the second one is for decryption also known as the private key. Asymmetric-key cryptography is characterized by the RSA algorithm. RSA Algorithm The acronym RSA is an abbreviation of the names of the inventors of the algorithm Rivest, Shamir and Adleman. It is based on the mathematical complexity of factorizing large prime numbers. Practical Applications Ciphers are used in various applications to ensure secure communication and data protection: Secure Communications: Ciphers encrypts emails, instant messages, and VoIP in order to secure the information from being accessed by other people. Financial Transactions: Online banking and electronic commerce payments or transactions require encryption in protecting the details of the financial information. Data Storage: All information that is saved in the devices or in the cloud is protected by encryption to ensure that it is not accessible to the unauthorized persons. Authentication: Authentication protocols use encryption to ensure that the communication is legitimate, meaning users and devices. Digital Signatures: It is through the use of encryption in digital signatures that documents are made secure to be used in the right way. Conclusion Ciphers are the most vital components of cryptography. From the simple Caesar cipher to the complex and advanced algorithms such as the AES and RSA ciphers are still being developed up to the present to address the increasing needs for protecting data. It is necessary to comprehend the principles of ciphers and their use in the field of IT and security for everyone. Through understanding the concept of encryption and decryption, therefore, one is in a better position to safeguard their privacy and their business, that is, ensuring that the information passed through digital channels is both private and secure. Comment Article Tags: Article Tags: Computer Networks cryptography Explore Computer Network Basics Computer Networking 3 min read Types 4 min read Internet 5 min read Network Devices 3 min read OSI Model 8 min read TCP/IP Model 6 min read OSI vs TCP/IP Model 4 min read Physical Layer Physical Layer 2 min read Network Topology 9 min read Transmission Modes 2 min read Transmission Media 9 min read Data Link Layer Data Link Layer 4 min read Switching 3 min read Virtual LAN 4 min read Framing 3 min read Error Control 4 min read Flow Control 4 min read Piggybacking 2 min read Network Layer Network Layer 3 min read Classful Addressing 7 min read Classless Addressing 7 min read IP Address 11 min read IPv4 Datagram Header 4 min read IPv4 vs IPv6 3 min read Public vs Private IP 4 min read Subnetting 5 min read Routing 5 min read Protocols 9 min read Transport Layer Transport Layer 4 min read Protocols 3 min read TCP 4 min read UDP 3 min read Session Layer & Presentation Layer Session Layer 2 min read Presentation Layer 3 min read Secure Socket Layer 3 min read Point-to-Point Tunneling Protocol 3 min read MIME Protocol 3 min read Application Layer Application Layer 4 min read Client-Server Model 5 min read WWW 4 min read Electronic Mail 4 min read Content Distribution Network 4 min read Protocols 4 min read Advanced Topics Network Security 4 min read QoS & Multimedia 8 min read Authentication 3 min read Encryption 6 min read Firewall 2 min read MAC Filtering 3 min read Wi-Fi Standards 3 min read Bluetooth 5 min read Wireless Communication 5 min read Cloud Networking 4 min read Practice Networking Interview Q&A 15+ min read TCP/IP Interview Q&A 15+ min r

類似記事(ベクトル近傍)