# \_cryptology

Messages have value linked to the improbability of certain groups of elements appearing in a specific order. To preserve this value, it's important to maintain the original order of the words in the message and, at times, the secrecy of the conveyed message. Confidentiality is used to maintain secrecy (the improbability of the message) , whilst integrity maintains the intended semantic with a specific order of words in a message.

Cryptology is a tool for achieving these specific objectives. Cryptography creates these tools, and cryptanalysis ensures their effectiveness.

In this series, we will explore the evolution of cryptosystems from basic methods like transposition and substitution ciphers to advanced post-quantum algorithms such as ML-DSA, ML-KEM, and SLH-DSA. At each stage, we'll discuss practical attacks and the cryptanalysis that highlights the need for better algorithms.

The first attacks we can think of are based on the following idea:

Messages are created to convey meaning. To achieve this, a message must follow a specific pattern determined by the language and transmission medium used. In simpler terms, when writing a text, the likelihood of what the next character will be is governed by a certain probability distribution.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://semiotic.gitbook.io/semiotic/_tutorials/_cryptology.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
