The operational ingredients in the crypto architecture are:
The Plaintext
The Ciphertext
The Encryption Key
The Decryption Key
as played and moved around by:
Alice and Bob who try to share a secret over insecure lines
The Adversary who tries to pry into Alice and Bob secret
Noteworthy:
The hacker, the adversary is the only reason we practice cryptography... and their threat is what should determine our counter efforts! |
|