blob: b80b4b2bd62b0ae673b904a7e979aad3977449df [file] [log] [blame]
Alex Gaynor8c9dcb32013-11-03 13:10:57 -08001Glossary
2========
3
4.. glossary::
5
6 plaintext
7 User-readable data you care about.
8
9 ciphertext
10 The encoded data, it's not user readable. Potential attackers are able
11 to see this.
12
13 encryption
14 The process of converting plaintext to ciphertext.
15
16 decryption
17 The process of converting ciphertext to plaintext.
18
19 key
20 Secret data is encoded with a function using this key. Sometimes
21 multiple keys are used.
22
23 symmetric cryptography
24 Cryptographic operations where encryption and decryption use the same
25 key.
26
27 asymmetric cryptography
28 Cryptographic operations where encryption and decryption use different
29 keys. There are seperate encryption and decryption keys.