Cryptographic Primitive Definition & Meaning
A cryptographic primitive is a low-level algorithm used to build cryptographic protocols for a security system. It's used by cryptographic designers as their most basic building blocks. These building blocks are a part of a cryptosystem, which is a suite of cryptographic algorithms needed to implement a particular security service, such as encryption functions or one-way hash functions.
Because these primitives are building blocks, they are designed to do one precisely-defined and highly-reliable task. Creating and testing a primitive to be reliable takes a long time and is very hard, so designing a new cryptographic primitive to suit the needs of a new cryptographic system is very rare. In this way, cryptographic primitives are similar to programming languages. It's rare that a programmer will invent a new programming language while writing a new program. Instead, they will use an existing language, just as a cryptographic designer will use an existing primitive to avoid the time-consuming and error-prone work of creating a new primitive.
Common cryptographic primitives
- One-way hash function: A mathematical function that takes a variable-length input string and converts it into a fixed-length binary sequence.
- Symmetric key cryptography: An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message.
- Public-key cryptography: Also known as asymmetric cryptography, a system that uses a pair of keys—a public key and private key. Any person can encrypt a message using the receiver's public key, but the encrypted message can only be decrypted with the receiver's private key.
- Mix network: A routing protocol that creates hard-to-trace communications. A chain of proxy servers encrypted using public-key cryptography are used to take in messages from multiple senders, shuffle them, then send them back in random order to the next destination.
- Private information retrieval: A protocol that allows a client to retrieve database information without the owner of the database knowing what specific information was retrieved.
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »Huge List of Computer Certifications
Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »