12 KiB
| title | chunk | source | category | tags | date_saved | instance |
|---|---|---|---|---|---|---|
| Cipher - Glossary | MDN | 1/3 | https://developer.mozilla.org/en-US/docs/Glossary/Cipher | reference | web, html, css, javascript, documentation | 2026-05-05T05:27:30.023444+00:00 | kb-cron |
MDN HTML HTML: Markup language
HTML reference
HTML guides
Markup languages
CSS reference
CSS guides
Layout cookbook
JavaScriptJS JavaScript: Scripting language
JS reference
JS guides
Web APIs Web APIs: Programming interfaces
Web API reference
Web API guides
- Using the Web animation API
- Using the Fetch API
- Working with the History API
- Using the Web speech API
- Using web workers
Technologies
Topics
Learn Learn web development
Frontend developer course
- Getting started modules
- Core modules
- MDN Curriculum
- Check out the video course from Scrimba, our partner
Learn HTML
Learn CSS
Learn JavaScript
Tools Discover our tools
About Get to know MDN better
Cipher
In cryptography, a cipher is an algorithm that can encrypt plaintext to make it unreadable, and to decrypt the encoded data back to plaintext again. Ciphers were common long before the information age (e.g., substitution ciphers, transposition ciphers, and permutation ciphers), but none of them were cryptographically secure except for the one-time pad. In the modern age, ciphers have evolved dramatically. AES, RSA and Blowfish are examples of ciphers that are integral part of contemporary encryption standards and systems. Modern ciphers are designed to withstand attacks discovered through cryptanalysis. There is no guarantee that all attack methods have been discovered, so each algorithm is recommended for different purposes based on known classes of attacks. Ciphers operate either as block ciphers on successive blocks (or buffers) of data, or as stream ciphers on a continuous data flow (often of sound or video). Ciphers are also classified according to how their keys are handled:
- symmetric key algorithms use the same key to encode and decode a message. The key also must be sent securely if the message is to stay confidential.
- asymmetric key algorithms use one key for encryption and the other for decryption.