a computational rule with at least one secret parameter (key) that can be used to encrypt or decrypt data

a mathematical function in which a computable set of steps must be followed to achieve a desired result

a mathematical function or equation that can be applied to transform data into an unintelligible form (i

a mathematical function or equation that can be implemented electronically in software to transform data into an unintelligible form

a mathematical function that combines data with the string of digits contained in a key to produce encrypted text

a mathematical function that takes intelligible information (plain text) as input and changes it into unintelligible cipher text

A general procedure for transforming data from plaintext to ciphertext and back again.

A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both.

A set of rules or directions used to perform cryptographic operations such as encryption and decryption.

An algorithm that employs the science of cryptography, including encryption algorithms, cryptographic hash algorithms, digital signature algorithms, and key agreement algorithms.