In , a is an algorithm that can to make it unreadable, and to it back. cryptography cipher encode cleartext decode Ciphers were common long before the information age (e.g., , , and ), but none of them were cryptographically secure except for the . substitution ciphers transposition ciphers permutation ciphers one-time pad Modern ciphers are designed to withstand discovered by a . There is no guarantee that all attack methods have been discovered, but each algorithm is judged against known classes of attacks. attacks cryptanalyst Ciphers operate two ways, either as on successive blocks, or buffers, of data, or as on a continuous data flow (often of sound or video). block ciphers stream ciphers They also are classified according to how their are handled: keys algorithms use the same key to encode and decode a message. The key also must be sent securely if the message is to stay confidential. symmetric key algorithms use a different key for encryption and decryption. asymmetric key View Previous Terms: Block cipher mode of operation Certificate authority Challenge-response authentication Cipher suite Ciphertext CORS CORS-safelisted request header CORS-safelisted response header Cross-site scripting Cryptanalysis Cryptographic hash function Cryptography CSP CSRF Decryption Digital certificate DTLS (Datagram Transport Layer Security) Encryption Forbidden header name Forbidden response header name Hash HMAC HPKP HSTS HTTPS Key MitM OWASP Preflight request Public-key cryptography Reporting directive Robots.txt Same-origin policy Session Hijacking SQL Injection Symmetric-key cryptography TOFU Transport Layer Security (TLS) Credits Source: https://developer.mozilla.org/en-US/docs/Glossary/Cipher Published under license Open CC Attribution ShareAlike 3.0