cryptosystem


Also found in: Thesaurus, Medical, Encyclopedia, Wikipedia.

cryptosystem

The associated items of cryptomaterial that are used as a unit and provide a single means of encryption and decryption. See also cipher; code; decrypt; encipher.
References in periodicals archive ?
This allows organizations to deploy an early preview of the Simple Security: Protect distributed cryptosystem specifically designed to stop nation-state information theft of host application data.
It describe the elgamal public-key cryptosystem and the diffehellman key exchange and the then extends these cryptosystem over the domain of gaussian integers.
Taher ElGamal [4, 11] described a modular exponentiation based cryptosystem on the multiplicative cyclic group [Z.
The RSA cryptosystem - introduced by Rivest, Shamir, and Adlement in 1977 - relies for its security on the difficulty of working out the factors dividing large integers.
We discuss some characteristics of an image cryptosystem and research issues of an image cryptosystem in Sections 3 and 4 respectively.
The companies said they developed an implementation technology of an elliptic curve cryptosystem, which features more greatly enhanced security functions than the current systems and is expected to be a standard for e-governance and e-commerce in Japan in the future.
In practice, one can call a cryptosystem "computationally secure," if the best known method of breaking the system requires an unreasonably large amount of computer time.
Invented more than 20 years ago, the so-called RSA cryptosystem is widely used to provide privacy for electronic mail, ensure authenticity of digital data, and handle credit-card payments on the Internet.
You can buy a disk containing a good public-key cryptosystem in software stores in Moscow.
II-25 Public-key Cryptosystems in Common Use II-26 RSA Cryptosystem: II-26 ElGamal Cryptosystem: II-26 Elliptic Curve Cryptosystems: II-26 McEliece Cryptosystem: II-26 Limitations in Public-key Cryptosystems Led to the Emergence of Quantum Cryptography II-27 6.
Parties would be able to identify whom they transact with by ensuring that the secret key ''cryptosystem'' -- a set of rules for encrypting messages sent over the Internet -- used by a party to a potential deal corresponds with its public key cryptosystem, which is registered with a registry office of the Justice Ministry beforehand.
The belief that factoring huge numbers is intrinsically difficult underlies one widely used cryptosystem.