What term is used to describe an encryption algorithm that has no corresponding decryption algorithm?

Definition: Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output of an encryption algorithm. The term "cipher" is sometimes used as an alternative term for ciphertext. Ciphertext is not understandable until it has been converted into plain text using a key.

Description: Earlier cipher algorithms were performed manually and were entirely different from modern algorithms which are generally executed by a machine. Different types of ciphers exist, some of which are:

Substitution Cipher: This offers an alternative to the plaintext. It is also known as Caesar cipher.

ADVERTISEMENT


Polyalphabetic Substitution Cipher: In this cipher, a mixed alphabet is used to encrypt the plaintext, but at random points it would change to a different mixed alphabet which indicates the change with an uppercase letter in the Ciphertext.

Transposition Cipher: This cipher is also known as Rail Fence Cipher and is a permutation of the plaintext.

Permutation Cipher: The positions held by plaintext are shifted to a regular system in this cipher so that the ciphertext constitutes a permutation of the plaintext.

ADVERTISEMENT


Private-key Cryptography: In this cipher, even the attacker is aware of the plaintext and corresponding ciphertext. The sender and receiver must have a pre-shared key. The shared key is kept secret from all other parties and is used for encryption as well as decryption. DES and AES algorithms are examples of this type of cipher. This cryptography is also known as "symmetric key algorithm".

Public-key Cryptography: In this cipher, two different keys - public key and private key - are used for encryption and decryption. The sender uses the public key to perform encryption, whereas the receiver is kept in the dark about the private key. This is also known as asymmetric key algorithm.

SearchNetworking

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity

  • data masking

    Data masking is a method of creating a structurally similar but inauthentic version of an organization's data that can be used ...

  • computer worm

    A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining ...

  • corporate governance

    Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled.

SearchCIO

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

  • social media recruitment (social media recruiting)

    Social media recruitment (social media recruiting) is the use of social media platforms to identify, engage and vet people the ...

  • video interview

    A video interview is a job interview that takes place remotely and uses video technology as the communication medium.

SearchCustomerExperience

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...