1. Discipline that embodies the principles, means, and methods for transforming data to hide their semantic content, prevent their unauthorized use, prevent their undetected modification, or establish their authenticity.
Source: Election Terminology Glossary - Draft, National Institute of Standards and Technology (NIST), https://pages.nist.gov/ElectionGlossary/
2. Discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, prevent their undetected modification and establish their authenticity.
Source: Glossary of terms database, U.S. Election Assistance Commission, https://www.eac.gov/glossary/
3. The art and science concerning the principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form. (DoDD 5100.20, NSA, 26 Jan 2010)
Also, the branch of cryptology that treats the principles, means, and methods of designing and using cryptosystems. (DoD 5200.1-R, Information Security Program, Jan 1997).
Terms & Definitions of Interest for DoD Counterintelligence Professionals, Office of the National Counterintelligence, https://www.dni.gov/files/NCSC/documents/ci/CI_Glossary.pdf
4. The art or science concerning the principles, means, and methods for converting plaintext into ciphertext and for restoring encrypted ciphertext to plaintext.
5. The mathematical science that deals with cryptanalysis and cryptography.
6. The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
Source: Explore Terms: A Glossary of Common Cybersecurity Terminology, National Initiative for Cybersecurity Careers and Studies (NICCS), https://niccs.us-cert.gov/about-niccs/glossary
7. The science that deals with hidden, disguised, or encrypted communications. It includes communications security and communications intelligence. (JP 1-02).
Also, the branch of knowledge that treats the principles of cryptography and cryptanalytics; and the activities involved in producing signals intelligence (SIGINT) and maintaining communications security (COMSEC). (DoDD 5100.20, NSA, 26 Jan 2010).
Source: Terms & Definitions of Interest for DoD Counterintelligence Professionals, Office of the National Counterintelligence, https://www.dni.gov/files/NCSC/documents/ci/CI_Glossary.pdf
8. The practice and study of encryption and decryption, whereby, for example, a message is encoded so that it can only be decrypted by those with one or more keys known only to the intended recipient(s).
Source: Independent Panel on Internet Voting, British Columbia, https://elections.bc.ca/docs/recommendations-report.pdf