from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • noun Plural form of cryptosystem.


Sorry, no etymologies found.


  • The whole post is good and goes on from there to talk about real and possible vulnerabilities in cryptosystems (for example, the government could break into your house and put a keylogger in your computer for a fraction of the cost of attempting to break the crypto).

    Boing Boing: July 9, 2006 - July 15, 2006 Archives

  • One day Silver carefully explained to Diffie how modern cryptosystems worked.


  • In later years, both power and radiation were used to break cryptosystems.

    My Data, Your Machine

  • In later years, both power and radiation were used to break cryptosystems.

    My Data, Your Machine

  • We've got good, public-key cryptosystems at our disposal -- we should be incorporating these ciphers into all of our "private" communications.

    Boing Boing: April 14, 2002 - April 20, 2002 Archives

  • Remember David McOwen, the guy who got charged with numerous counts of hacking for installing distributed. net -- a client for a distributed computing project to brute-force solutions to cryptosystems -- on the university computers he was the sysadmin for while they were sitting idle over the Xmas break?

    Boing Boing: January 13, 2002 - January 19, 2002 Archives

  • Under the reasoning of Sony, since DeCSS does have the lawful use of allowing consumers to play DVDs on Linux machineswhich, unlike Windows and Macintosh machines, ordinarily do not have drivers available to play CSS-encrypted disksreinforced by the reasoning in Bernstein as to publishing specifications for cryptosystems, this part of the DMCA cannot stand.

    Scrivener's Error

  • This is the first step toward complex Quantum Computers that can factor very large numbers into their primes, which would, among other things, compromise most cryptosystems in use today.

    Boing Boing: December 16, 2001 - December 22, 2001 Archives

  • In conventional cryptosystems, such as the US Federal Data Encryption Standard (DES), a single key is used for both encryption and decryption.

    FAQ: Alt.Security.PGP (Part III)

  • In public key cryptosystems, everyone has two related complementary keys, a publicly revealed key and a secret key.

    FAQ: Alt.Security.PGP (Part III)


Log in or sign up to get involved in the conversation. It's quick and easy.