dcsimg
Main » TERM » C »

Cryptographic Primitive Definition & Meaning

A cryptographic primitive is a low-level algorithm used to build cryptographic protocols for a security system. It's used by cryptographic designers as their most basic building blocks. These building blocks are a part of a cryptosystem, which is a suite of cryptographic algorithms needed to implement a particular security service, such as encryption functions or one-way hash functions.

Because these primitives are building blocks, they are designed to do one precisely-defined and highly-reliable task. Creating and testing a primitive to be reliable takes a long time and is very hard, so designing a new cryptographic primitive to suit the needs of a new cryptographic system is very rare. In this way, cryptographic primitives are similar to programming languages. It's rare that a programmer will invent a new programming language while writing a new program. Instead, they will use an existing language, just as a cryptographic designer will use an existing primitive to avoid the time-consuming and error-prone work of creating a new primitive.

Common cryptographic primitives

  • One-way hash function: A mathematical function that takes a variable-length input string and converts it into a fixed-length binary sequence.
  • Symmetric key cryptography: An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message.
  • Public-key cryptography: Also known as asymmetric cryptography, a system that uses a pair of keys—a public key and private key. Any person can encrypt a message using the receiver's public key, but the encrypted message can only be decrypted with the receiver's private key.
  • Mix network: A routing protocol that creates hard-to-trace communications. A chain of proxy servers encrypted using public-key cryptography are used to take in messages from multiple senders, shuffle them, then send them back in random order to the next destination.
  • Private information retrieval: A protocol that allows a client to retrieve database information without the owner of the database knowing what specific information was retrieved.









LATEST ARTICLES
Texting & Chat Abbreviations

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »

Huge List of Computer Certifications

Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »

STUDY GUIDES
Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

The Five Generations of Computers

Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »