U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptography

Definition(s):

  The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification.
Source(s):
NIST SP 800-59 under Cryptography from ANSDIT
NIST SP 1800-21B under Cryptography from CNSSI 4009-2015

  3. The discipline that embodies the principles, means, and methods for the providing information security, including confidentiality, data integrity, non-repudiation, and authenticity.
Source(s):
CNSSI 4009-2015 from NIST SP 800-21 2nd edition

  2. The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification.
Source(s):
CNSSI 4009-2015 from NIST SP 800-59

  1. Art or science concerning the principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form.
Source(s):
CNSSI 4009-2015 from NSA/CSS Manual Number 3-16 (COMSEC)

  The discipline that embodies the principles, means, and methods for providing information security, including confidentiality, data integrity, source authentication, and non-repudiation.
Source(s):
NIST SP 800-175B Rev. 1 under Cryptography

  The art and science of using mathematics to secure information and create a high degree of trust in the electronic realm.
Source(s):
NISTIR 7316 under Cryptography

  The discipline that embodies principles, means and methods for providing information security, including confidentiality, data integrity, non- repudiation, and authenticity.
Source(s):
NISTIR 8040 under Cryptography