Cryptography is the study of the methods of hiding information to protect it from unauthorized access. Cryptographic functions are a critical element of modern cybersecurity and are used to protect data from malicious actors. Cryptographic techniques can secure any digital content—texts, images, videos, or audio.
A common form of cryptographic use is encryption, which turns messages into secret codes (called ciphertext) that can only be unlocked with a special decryption key. Cryptography has been around since ancient times, and its name comes from the Greek “kryptos,” meaning “hidden.” One of the first examples is ”Caesar’s Cipher” used by Julius Caesar around 58 BC, that shifted letters in a message to render it unreadable should it be intercepted.
From its ancient roots, modern cryptography has become much more advanced, but it still follows four basic principles:
There are many common ways in which cryptography is used:
Cryptographic keys can be thought of as secret codes used to lock and unlock encrypted information. Managing these keys — creating, sharing, storing, and replacing them — is a critical and complex part of keeping data safe.
One popular method to share keys securely over the internet is the Diffie-Hellman key exchange, another is asymmetric key cryptography. Modern cryptographic keys can be 128, 256, or even 2,048 bits long, and these bits are used to scramble data in ways that are nearly impossible to guess.
For instance:
A 56-bit key could be broken in about 13 minutes.
If a bad actor tried to break a simple cipher, they could quickly try every possible combination — this is called a brute force attack. But with longer keys, brute force attacks would take much longer. However, there is the fear that quantum computers will soon be able to break even the strongest encryption methods that are used to secure information today.
Fortunately, cryptography is evolving to keep up with the quantum threat. New methods include quantum cryptography, lattice-based cryptography, and Elliptic Curve Cryptography (ECC).
Elliptic Curve Cryptography (ECC): ECC is an advanced encryption method that creates smaller, faster, and more efficient cryptographic keys compared to older systems. Unlike traditional methods, ECC uses curved lines (elliptic curves) on a graph to generate keys, making it more efficient, especially for devices with less computing power, like smartphones. Companies like Apple, Bitcoin, and the US government are already using ECC. As quantum computingWhat is Quantum Computing? Quantum computing is a cutting-edge field that leverages the principles of modern physics to perform operations significantly faster than classical computers. Classical computers, including the laptops,… More grows, ECC is expected to become the standard for online security.
Quantum Cryptography: Quantum cryptography uses the laws of quantum mechanics to secure data in a way that traditional encryption cannot. It sends light particles (photons) across fiber optic cables to share secret keys between the sender and receiver. Because observing quantum data changes it, any attempt to compromise it would be immediately noticed. Although it’s still in its infancy, quantum cryptography promises to be infinitely more secure than traditional systems, preventing eavesdropping and integrating with other encryption methods.
Lattice-based Cryptography: Lattice-based cryptography uses grids of points in multiple dimensions for encryption, providing a way to protect data against quantum computers.
For more essential cybersecurity definitions, check out our glossary here.