Skip to content

Getting Your Cryptography Vocabulary Straight

Don't worry – we're not going to throw a dictionary at you! Think of this as your friendly guide to understanding the language cryptographers use. Once you know these terms, everything else will start making sense.

The Building Blocks

Cryptography

Simply put, it's the art and science of keeping secrets. Whether you're protecting a love letter or securing a bank transaction, cryptography gives you the tools to make sure only the right people can read your information.

Encryption

This is where the magic happens! Encryption takes your readable message (we call this "plaintext") and scrambles it into something that looks like gibberish (called "ciphertext").

Think of it like this: You write "HELLO" and encryption turns it into "KHOOR" using a simple shift cipher. Anyone seeing "KHOOR" would have no idea what you originally wrote.

Decryption

The flip side of encryption – this is how you turn that scrambled mess back into something readable. If you know the secret (the key), you can convert "KHOOR" back to "HELLO" and read the original message.

Cipher

This is just a fancy word for the recipe or algorithm that does the scrambling. Some are simple (like shifting each letter by 3 positions), others are incredibly complex mathematical formulas that would make your calculator cry.

Classic examples: Caesar cipher, Vigenère cipher
Modern powerhouses: AES, RSA, ChaCha20

Key

Think of this as your secret ingredient. It's the piece of information that makes your encryption unique to you. Without the right key, even if someone knows your cipher, they can't decrypt your message.

Two main types:

  • Symmetric key: Same key locks and unlocks (like a house key)
  • Public/private key pairs: Different keys for locking and unlocking (more on this later!)

The Two Main Flavors of Cryptography

Symmetric Cryptography

This is like having a shared house key with your roommate. You both use the same key to lock and unlock the door.

The good news: It's super fast and efficient
The challenge: How do you safely give someone the key without others intercepting it?
Popular examples: AES (the gold standard), DES (the old-timer), ChaCha20 (the speed demon)

Asymmetric Cryptography

This is where things get really clever! Instead of one key, you get a pair: one public (that you can share with everyone) and one private (that you keep secret).

The magic: Someone can use your public key to encrypt a message that only your private key can decrypt
The trade-off: It's slower than symmetric, but solves that key-sharing problem beautifully
Famous examples: RSA (the classic), ECC (the efficient one), DSA (for signatures)

Hash Functions

These are the one-way streets of cryptography. You can easily go from your input to the output, but good luck trying to go backwards!

What they do: Take any size input and give you a fixed-size "fingerprint"
Why they're useful: Password storage, checking if files have been tampered with
The stars: SHA-256, SHA-3, BLAKE2

The Basic Vocabulary You'll Hear Everywhere

Plaintext

This is your original, readable message before any encryption happens. Could be "Meet me at noon" or your credit card number – basically anything in its natural, understandable form.

Ciphertext

The scrambled result after encryption does its thing. It should look completely random to anyone who doesn't have the key. If you can still read it, something went wrong!

Protocol

Think of this as the rulebook for how different cryptographic pieces work together. Like how TLS makes sure your web browsing is secure, or how SSH lets you safely connect to remote computers.

Nonce

Short for "number used once" – it's exactly what it sounds like! This random number ensures that even if you encrypt the same message twice, you'll get different results each time. Pretty neat, right?

Salt

Random data that gets mixed into your password before hashing. It's like adding a unique secret ingredient to each password so that even if two people use "password123" (please don't!), their stored hashes will be completely different.

The Security Concepts That Actually Matter

Authentication

This answers the question: "Are you really who you say you are?" It's like checking someone's ID at a club, but for digital systems.

Common methods: Passwords (the old reliable), certificates (the fancy ID cards), biometrics (your unique you-ness)
Modern twist: Multi-factor authentication – because one proof isn't enough anymore!

Authorization

Once we know who you are, this decides what you're allowed to do. Think of it as the bouncer who not only checks your ID but also your VIP status.

How it works: Access control lists, role-based permissions, the principle of "give people the minimum access they need"

Integrity

This is about making sure your data hasn't been messed with. Like having a tamper-evident seal on your medication bottle.

The tools: Message Authentication Codes (MACs), digital signatures, hash functions

Non-repudiation

Fancy term for "you can't deny you did this." It's like having a signed receipt – you can't later claim you never made that purchase.

How we achieve it: Digital signatures, audit logs, timestamps

When Things Go Wrong: Common Attack Types

Brute Force Attack

The "try every possible combination" approach. It's like a burglar trying every key on a massive keyring until one works.

Defense: Make your keys long enough that this would take longer than the age of the universe

Man-in-the-Middle (MITM)

Imagine someone secretly listening to your phone conversation and even changing what you say. That's essentially what this attack does to digital communications.

Where it happens: Unsecured Wi-Fi networks, compromised routers
Protection: Strong authentication and encryption

Dictionary Attack

Instead of trying every possible password, attackers use lists of common passwords. Spoiler alert: "password123" is definitely on those lists.

Why it works: People are predictable
Defense: Use unique, complex passwords (password managers are your friend!)

The Technical Building Blocks

Random Number Generator (RNG)

These create the randomness that makes cryptography work. Without good randomness, even the best encryption becomes breakable.

Types: True random (from physical processes) and pseudorandom (from algorithms)
Critical for: Key generation, creating nonces, basically everything secure

Key Derivation Function (KDF)

These take a master key or password and stretch it into the specific keys you need. Think of it as a key-making machine.

Popular ones: PBKDF2, Argon2
Why they're slow: On purpose! It makes attacks much harder

Message Authentication Code (MAC)

This is like a digital signature that proves a message came from who you think it did and hasn't been changed.

How it works: Combines your message with a secret key to create a unique tag
Common type: HMAC (Hash-based MAC)

The Standards and Protocols You Should Know

Transport Layer Security (TLS)

This is what keeps your web browsing secure – you know, that little lock icon in your browser? That's TLS doing its job.

What it replaced: SSL (which you might still hear people mention)
Where you see it: HTTPS websites, secure email, basically any secure internet communication
How it works: Combines multiple cryptographic techniques to create a secure tunnel

Digital Certificates

Think of these as digital ID cards that prove a website or person is who they claim to be.

Format: X.509 (the standard)
What's inside: Public key, identity information, digital signature from a trusted authority
Who issues them: Certificate Authorities (CAs) – the digital equivalent of the DMV

Zero-Knowledge Proof

This is mind-bending stuff: proving you know something without actually revealing what you know. Like proving you know the password without saying the password.

The three properties: Completeness (if you know it, you can prove it), soundness (you can't fake it), zero-knowledge (no info leaked)
Cool uses: Privacy-preserving authentication, blockchain applications

Practical Advice: Best Practices That Actually Work

Key Management

  • Rotate regularly: Don't use the same keys forever
  • Store securely: Treat keys like the crown jewels
  • Have backups: But secure ones!
  • Control access: Not everyone needs every key

Password Security

  • Length matters more than complexity: "correct horse battery staple" beats "P@ssw0rd1"
  • Unique passwords everywhere: One breach shouldn't compromise everything
  • Use a password manager: Your brain wasn't designed to remember 100+ unique passwords
  • Hash, don't store: Never keep plaintext passwords

Algorithm Selection

  • Stick to the standards: Don't roll your own crypto
  • Stay current: What was secure 10 years ago might not be today
  • Follow expert recommendations: NIST, security researchers, and established libraries know what they're doing
  • Plan for updates: Build systems that can evolve

Your Cryptographic Toolkit

OpenSSL

The Swiss Army knife of cryptography. It can generate keys, create certificates, encrypt files, and about a million other things.

What it's good for: Certificate management, testing, one-off cryptographic tasks
Interface: Command-line (with a learning curve, but worth it)

GPG (GNU Privacy Guard)

Your go-to for email encryption and file security. It's like having a personal cryptography assistant.

Perfect for: Encrypting emails, signing documents, securing files
Bonus: Works across different platforms and integrates with email clients

Password Managers

Not technically cryptographic tools, but they use cryptography to solve one of security's biggest problems: password management.

What they do: Generate strong passwords, store them securely, sync across devices
Why you need one: Because "password123" isn't cutting it anymore

Keep Learning: Where to Go Next

Documentation Worth Reading

  • RFCs: The official internet standards (dry but authoritative)
  • NIST publications: Government standards and guidelines
  • Academic papers: Where the cutting-edge research happens
  • Vendor docs: How to actually implement this stuff

Hands-On Practice

  • Cryptopals challenges: The gold standard for learning by doing
  • Crackable.xyz: Interactive cryptography challenges and puzzles
  • CTF competitions: Competitive cryptography problem-solving
  • Online platforms: Interactive learning environments
  • Security labs: Safe spaces to break things and learn

Communities That Care

  • Security forums: Where practitioners share real-world experiences
  • Academic groups: Where the theory gets developed
  • Professional organizations: Networking and continuing education
  • Online communities: Reddit, Discord, Stack Overflow – where questions get answered

Remember: This terminology guide is your foundation. Don't worry about memorizing everything right now – come back to it as you learn more. The important thing is to start building your understanding, one concept at a time.

Released under the MIT License.