Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptography

Definitions:

  The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification.
Sources:
NIST SP 1800-21B under Cryptography from CNSSI 4009-2015
NIST SP 800-59 under Cryptography from ANSDIT

  3. The discipline that embodies the principles, means, and methods for the providing information security, including confidentiality, data integrity, non-repudiation, and authenticity.
Sources:
CNSSI 4009-2015

  2. The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification.
Sources:
CNSSI 4009-2015 from NIST SP 800-59

  Art or science concerning the principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form.
Sources:
CNSSI 4009-2015 from NSA/CSS Manual Number 3-16 (COMSEC)

  The discipline that embodies the principles, means, and methods for providing information security, including confidentiality, data integrity, source authentication, and non-repudiation.
Sources:
NIST SP 800-175B Rev. 1 under Cryptography

  The art and science of using mathematics to secure information and create a high degree of trust in the electronic realm.
Sources:
NISTIR 7316 under Cryptography

  The discipline that embodies principles, means and methods for providing information security, including confidentiality, data integrity, non- repudiation, and authenticity.
Sources:
NISTIR 8040 under Cryptography