Category:Cryptography: Difference between revisions

From WikiMD's Wellness Encyclopedia

Created automatically by the AutoCreateCategoryPages extension.
 
en>AnnaBSP
No edit summary
Line 1: Line 1:
This is a category page.
{{Category diffuse}}
It lists all of the pages in category "Cryptography" as well as all subcategories of category "Cryptography" if any exist.
{{Commons category}}
{{Cat main}}
'''Cryptography''' is the study of ways to convert [[information]] from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of ''[[encryption]]''. In the past, cryptography helped ensure [[secrecy]] in important [[communication]]s, such as those of [[spy|spies]], [[military]] leaders, and [[diplomat]]s. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like [[digital signature]]s and [[digital cash]], [[digital rights management]] for [[intellectual property]] protection, and securing [[electronic commerce]]. Cryptography is now often built into the [[infrastructure]] for [[computing]] and [[telecommunications]]; users may not even be aware of its presence.
{{See also|Timeline of cryptography}}
{{CatAutoTOC}}
[[Category:Applied mathematics]]
[[Category:Military communications]]
[[Category:Espionage techniques]]
[[Category:Secrecy]]
[[Category:Cyberwarfare]]
[[Category:Secure communication]]
[[Category:Cybersecurity engineering]]

Revision as of 13:47, 21 November 2024

   



Cryptography is the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.