Index of cryptography articles

Articles related to cryptography include:

A

A5/1A5/2ABA digital signature guidelinesABC (stream cipher)Abraham SinkovAcoustic cryptanalysisAdaptive chosen-ciphertext attackAdaptive chosen plaintext and chosen ciphertext attack Advantage (cryptography)ADFGVX cipherAdi ShamirAdvanced Access Content SystemAdvanced Encryption StandardAdvanced Encryption Standard processAdversaryAEAD block cipher modes of operationAffine cipherAgnes Meyer DriscollAKA (security)Akelarre (cipher)Alan TuringAlastair DennistonAl Bhed languageAlex BiryukovAlfred MenezesAlgebraic EraserAlgorithmically random sequenceAlice and BobAll-or-nothing transformAlphabetum KaldeorumAlternating step generatorAmerican Cryptogram AssociationAN/CYZ-10Anonymous publicationAnonymous remailerAntoni PalluthAnubis (cipher)Argon2ARIA (cipher)Arlington HallArne BeurlingArnold CipherArray controller based encryptionArthur ScherbiusArvid Gerhard Damm • Asiacrypt • AtbashAttack modelAuguste KerckhoffsAuthenticated encryptionAuthenticationAuthorization certificateAutokey cipherAvalanche effect

B

B-DienstBabington PlotBaby-step giant-stepBacon's cipherBanburismusBart PreneelBaseKingBassOmaticBATONBB84Beale ciphersBEAR and LION ciphersBeaufort cipherBeaumanor HallBent functionBerlekamp–Massey algorithmBernstein v. United StatesBestCryptBiclique attackBID/60BID 770Bifid cipherBill WeisbandBinary Goppa codeBiometric word listBirthday attackBit-flipping attackBitTorrent protocol encryptionBiuro SzyfrówBlack ChamberBlaise de VigenèreBletchley Park • Blind credential Blinding (cryptography)Blind signatureBlock cipherBlock cipher mode of operationBlock size (cryptography)Blowfish (cipher)Blum Blum ShubBlum–Goldwasser cryptosystemBomba (cryptography)BombeBook cipherBooks on cryptographyBoomerang attackBoris HagelinBouncy Castle (cryptography)Broadcast encryptionBruce SchneierBrute-force attackBrute Force: Cracking the Data Encryption StandardBurrows–Abadi–Needham logicBurt Kaliski

C

C2NetC-36 (cipher machine)C-52 (cipher machine)CAcert.orgCaesar cipherCamellia (cipher)CAPICOMCapstone (cryptography)Cardan grilleCard catalog (cryptology)Carlisle AdamsCAST-128CAST-256Cayley–Purser algorithmCBC-MACCCM modeCCMPCD-57CDMFCellular Message Encryption AlgorithmCentiban Central Security ServiceCentre for Applied Cryptographic ResearchCentral Bureau • Certicom • Certificate authorityCertificate-based encryptionCertificateless cryptographyCertificate revocation listCertificate signing requestCertification path validation algorithmChaffing and winnowingChallenge-Handshake Authentication ProtocolChallenge–response authenticationChosen-ciphertext attackChosen-plaintext attackCIKS-1Cipher diskCipher runesCipher security summaryCipherSaberCiphertext expansionCiphertext indistinguishabilityCiphertext-only attackCiphertext stealingCIPHERUNICORN-ACIPHERUNICORN-EClassical cipherClaude ShannonClaw-free permutationCleartextCLEFIAClifford CocksClipper chipClock (cryptography)Clock driftCMVP COCONUT98CodebookCode (cryptography)Code talkerCodress messageCold boot attackCollision attackCollision resistanceColossus computerCombined Cipher MachineCommitment schemeCommon Scrambling AlgorithmCommunications securityCommunications Security EstablishmentCommunication Theory of Secrecy SystemsComparison of disk encryption softwareComparison of SSH clientsCompleteness (cryptography)Complexity trap Computational Diffie–Hellman assumptionComputational hardness assumption • Computer insecurity • Computer and network surveillanceCOMSEC equipmentConch (SSH)Concrete securityConel Hugh O'Donel AlexanderConfidentialityConfusion and diffusionContent-scrambling system Controlled Cryptographic ItemCorkscrew (program)Correlation immunityCOSICCovert channelCover (telecommunications)Crab (cipher)Cramer–Shoup cryptosystemCRAM-MD5CRHF Crib (cryptanalysis)CrossCryptCrowds (anonymity network)Crypt (C)CryptanalysisCryptanalysis of the EnigmaCryptanalysis of the Lorenz cipherCryptanalytic computerCryptexCrypticoCrypto AGCrypto-anarchismCrypto API (Linux)Microsoft CryptoAPICryptoBuddyCryptochannel • CRYPTO (conference) • CryptogramCryptographically Generated AddressCryptographically secure pseudorandom number generatorCryptographically strong • Cryptographic Application Programming Interface Cryptographic hash functionCryptographic key typesCryptographic Message SyntaxCryptographic primitiveCryptographic protocolCryptographic Service ProviderCryptographie indéchiffrableCryptographyCryptography in JapanCryptography newsgroupsCryptography standardsCrypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital AgeCryptologiaCryptology ePrint ArchiveCryptology Research Society of IndiaCryptomathicCryptomeCryptomeria cipherCryptonomiconCrypToolCrypto phone Crypto-society CryptosystemCryptovirologyCRYPTRECCS-CipherCurve25519Curve448Custom hardware attackCycles per byteCyclometerCypherpunkCyrillic Projector

D

D'Agapeyeff cipherDaniel J. BernsteinData Authentication AlgorithmData Encryption StandardDatagram Transport Layer SecurityDavid ChaumDavid KahnDavid NaccacheDavid WagnerDavid Wheeler (computer scientist)Davies attack • Davies–Meyer hash DEALDeciphermentDecisional Diffie–Hellman assumptionDecorrelation theoryDecrypt DeCSSDefence Signals DirectorateDegree of anonymityDelegated Path DiscoveryDelegated Path ValidationDeniable encryptionDerek TauntDerived unique key per transactionDES ChallengesDES supplementary materialDES-XDeterministic encryptionDFC (cipher)Dictionary attackDifferential cryptanalysisDifferential-linear attackDifferential power analysis Diffie–Hellman key exchangeDiffie–Hellman problemDigiCipher 2Digital FortressDigital rights managementDigital signatureDigital Signature AlgorithmDigital signature forgeryDigital timestampingDigital watermarkingDilly KnoxDining cryptographers problemDiplomatic bagDirect Anonymous AttestationDiscrete logarithmDisk encryptionDisk encryption hardwareDisk encryption softwareDistance-bounding protocolDistinguishing attackDistributed.netDMA attackdm-crypt • Dmitry Sklyarov • DomainKeysDon CoppersmithDorabella CipherDouble Ratchet AlgorithmDoug StinsonDragon (cipher)DRYADDual_EC_DRBG

E

E0 (cipher)E2 (cipher)E4M • EAP-AKA • EAP-SIM • EAX modeECC patentsECHELONECRYPTEdouard Fleissner von WostrowitzEdward HebernEdward ScheidtEdward TravisEFF DES crackerEfficient Probabilistic Public-Key Encryption SchemeEKMS Electronic Communications Act 2000 • Electronic money • Electronic signatureElectronic votingElGamal encryptionElGamal signature schemeEli BihamElizebeth FriedmanElliptic-curve cryptographyElliptic-curve Diffie–HellmanElliptic Curve DSAEdDSAElliptic curve only hashElonka DuninEncrypted functionEncrypted key exchangeEncrypting File SystemEncryptionEncryption softwareEnigmailEnigma machineEnigma rotor detailsEntrustErnst FetterleineSTREAMÉtienne Bazeries • Eurocrypt • EuroCryptExport of cryptographyExtensible Authentication Protocol

F

Fast Software Encryption • Fast syndrome-based hashFEA-MFEALFeige–Fiat–Shamir identification schemeFeistel cipherFélix DelastelleFialkaFilesystem-level encryptionFileVaultFill deviceFinancial cryptographyFIPS 140FIPS 140-2Firefly (key exchange protocol)FISH (cipher)Fish (cryptography)FloradoraFluhrer, Mantin and Shamir attackFormat-preserving encryptionFortezzaFort George G. MeadeFortuna (PRNG)Four-square cipherFranciszek PokornyFrank A. StevensonFrank RowlettFreenetFreeOTFEFreeS/WANFrequency analysisFriedrich KasiskiFritz-chipFROGFROSTBURGFTP over SSH • Full disk encryption • Full Domain HashF. W. Winterbotham

G

Galois/Counter ModeGardening (cryptanalysis)GCHQ BudeGCHQ CSO MorwenstowGDESGeneric Security Services Application Program InterfaceGeorge BlakleyGeorge ScovellGGH encryption schemeGGH signature schemeGilbert VernamGMR (cryptography)GNU Privacy GuardGnuTLSGoldwasser–Micali cryptosystemGordon WelchmanGOST (block cipher)GOST (hash function)Government Communications Headquarters Government Communications Security BureauGrain (cipher)Grand Cru (cipher)Great CipherGrill (cryptology)Grille (cryptography)Group-based cryptographyGroup signatureGrover's algorithmGustave BertrandGwido Langer

H

H.235HAIFA constructionHAIPEHans DobbertinHans-Thilo SchmidtHard-core predicateHardware random number generatorHardware security moduleHarold KeenHarry HinsleyHarvest (computer) HAS-160Hash-based cryptographyHashcashHash chain Hash function security summaryHash listHasty Pudding cipherHAVALHC-256HC-9Heath Robinson (codebreaking machine)Hebern rotor machineHenri BraqueniéHenryk ZygalskiHerbert YardleyHidden Field EquationsHideki ImaiHierocryptHigh-bandwidth Digital Content ProtectionHigher-order differential cryptanalysisHill cipherHistory of cryptographyHMACHMAC-based One-time Password algorithm (HOTP) • Horst FeistelHoward HeysHttpsHugo HadwigerHugo KochHushmailHut 6Hut 8HX-63Hybrid cryptosystemHyperelliptic curve cryptographyHyper-encryption

I

Ian GoldbergIBM 4758ICE (cipher)ID-based cryptographyIDEA NXTIdentification friend or foe • IEEE 802.11i IEEE P1363I. J. GoodIllegal primeImpossible differential cryptanalysisIndex of coincidenceIndifferent chosen-ciphertext attackIndistinguishability obfuscationIndocrypt Information leakageInformation Security GroupInformation-theoretic securityInitialization vectorInteger factorizationIntegral cryptanalysisIntegrated Encryption SchemeIntegrated Windows AuthenticationInterlock protocolIntermediate certificate authoritiesInternational Association for Cryptologic ResearchInternational Data Encryption AlgorithmInternet Key ExchangeInternet Security Association and Key Management ProtocolInterpolation attackInvisible inkIPsecIraqi block cipherISAAC (cipher)ISO 19092-2 • ISO/IEC 9797 Ivan Damgård

J

Jacques SternJADE (cypher machine)James GilloglyJames H. EllisJames MasseyJan GralińskiJan KowalewskiJapanese naval codesJava Cryptography ArchitectureJefferson diskJennifer SeberryJerzy RóżyckiJoan DaemenJohannes TrithemiusJohn HerivelJohn Kelsey (cryptanalyst)John R. F. Jeffreys John TiltmanJon Lech JohansenJosef PieprzykJoseph DeschJoseph Finnegan (cryptographer)Joseph MauborgneJoseph RochefortJournal of CryptologyJunger v. Daley

K

Kaisa NybergKalyna (cipher) Kasiski examinationKASUMIKCDSAKeePassKerberos (protocol)Kerckhoffs's principleKevin McCurley (cryptographer)Key-agreement protocolKey authenticationKey clusteringKey (cryptography)Key derivation functionKey distribution centerKey escrowKey exchangeKeyfile Key generationKey generatorKey managementKey-recovery attackKey scheduleKey server (cryptographic)Key signature (cryptography)KeysigningKey signing partyKey sizeKey space (cryptography)KeystreamKey stretchingKey whiteningKG-84KHAZADKhufu and KhafreKiss (cryptanalysis)KL-43KL-51KL-7KleptographyKN-CipherKnapsack problemKnown-key distinguishing attackKnown-plaintext attackKnownSafe KOI-18KOV-14KryhaKryptosKSD-64KupynaKuznyechikKW-26KW-37 KY-3KY-57KY-58KY-68KYK-13

L

LacidaLadder-DESLamport signatureLars KnudsenLattice-based cryptographyLaurance SaffordLawrie BrownLCS35Leo MarksLeonard AdlemanLeon Battista AlbertiLeo RosenLeslie YoxallLEVIATHAN (cipher)LEX (cipher)Libelle (cipher) Linear cryptanalysisLinear-feedback shift registerLink encryptionList of ciphertextsList of cryptographersList of cryptographic file systems • List of cryptographic key types • List of cryptology conferencesList of telecommunications encryption termsList of people associated with Bletchley ParkList of SFTP clientsList of SFTP server softwareLOKILOKI97Lorenz cipherLouis W. TordellaLshLucifer (cipher)Lyra2

M

M6 (cipher)M8 (cipher)M-209M-325M-94MacGuffin (cipher)MadrygaMAGENTAMagic (cryptography)Maksymilian CiężkiMalcolm J. WilliamsonMalleability (cryptography)Man-in-the-middle attackMarian RejewskiMARS (cryptography) Martin HellmanMaruTukku Massey–Omura cryptosystem Matt BlazeMatt RobshawMax NewmanMcEliece cryptosystemmcryptMD2 (cryptography)MD4MD5MD5CRKMDC-2MDS matrix • Mean shortest distance Meet-in-the-middle attackMental pokerMercury (cipher machine)Mercy (cipher)Meredith GardnerMerkle signature schemeMerkle–Damgård constructionMerkle–Hellman knapsack cryptosystemMerkle's PuzzlesMerkle treeMESH (cipher)Message authenticationMessage authentication codeMessage forgeryMI8Michael LubyMICKEYMicrodotMilitary Cryptanalysis (book) (William F. Friedman) Military CryptanalyticsMimic functionMirror writingMISTY1Mitsuru MatsuiMMB (cipher)Mod n cryptanalysisMQVMS-CHAPMUGIMULTI-S01 MultiSwapMultivariate cryptography

N

National Communications CentreNational Cryptologic MuseumNational Security AgencyNational Cipher ChallengeNavajo INeal KoblitzNeedham–Schroeder protocolNegligible functionNEMA (machine)NESSIENetwork Security ServicesNeural cryptographyNew Data SealNewDESN-Hash Nicolas CourtoisNiederreiter cryptosystemNiels FergusonNigel de GreyNihilist cipherNikita BorisovNimbus (cipher)NIST hash function competitionNonlinear-feedback shift registerNOEKEONNon-malleable codes NoreenNothing up my sleeve numberNSA cryptographyNSA encryption systemsNSA in fictionNSAKEYNSA Suite A CryptographyNSA Suite B CryptographyNT LAN ManagerNTLMSSPNTRUEncryptNTRUSignNull cipherNumbers stationNUSHNTRU

O

Oblivious transferOCB modeOded GoldreichOff-the-Record MessagingOkamoto–Uchiyama cryptosystemOMI cryptograph OMNI (SCIP)One-key MACOne-time padOne-time passwordOne-way compression functionOne-way functionOnion routingOnline Certificate Status ProtocolOP-20-GOpenPGP cardOpenSSHOpenSSLOpenswanOpenVPNOperation RuthlessOptimal asymmetric encryption paddingOver the Air Rekeying (OTAR) • OTFE Otway–Rees protocol

P

Padding (cryptography)Padding oracle attackPaillier cryptosystemPairing-based cryptographyPanama (cryptography)Partitioning cryptanalysisPassive attackPassphrasePasswordPassword-authenticated key agreementPassword crackingPassword Hashing CompetitionPaul KocherPaulo PancatuccioPaulo S. L. M. BarretoPaul van OorschotPBKDF2PC BrunoPepper (cryptography)Perfect forward secrecyPerforated sheetsPermutation cipher Peter Gutmann (computer scientist)Peter JungerPeter TwinnPGP CorporationPGPDiskPGPfonePhelixPhil ZimmermannPhoturis (protocol)Physical securityPhysical unclonable functionPig LatinPigpen cipherPike (cipher)Piling-up lemmaPinwheel (cryptography)Piotr SmoleńskiPirate decryption • PKC (conference) • PKCSPKCS 11PKCS 12PKIXPlaintextPlaintext-aware encryptionPlayfair cipherPlugboardPMAC (cryptography)Poem codePohlig–Hellman algorithmPoint-to-Point Tunneling ProtocolPointcheval–Stern signature algorithmPoly1305Polyalphabetic cipherPolybius squarePortexPost-quantum cryptographyPost-Quantum Cryptography StandardizationPower analysisPreimage attackPre-shared keyPretty Good PrivacyPrinter steganographyPrivacy-enhanced Electronic MailPrivate Communications TechnologyPrivate information retrievalProbabilistic encryptionProduct cipherProof-of-work systemProtected Extensible Authentication ProtocolProvable securityProvably secure cryptographic hash functionProxy re-encryptionPseudo-Hadamard transformPseudonymityPseudorandom function Pseudorandom number generatorPseudorandom permutationPublic key certificatePublic-key cryptographyPublic key fingerprintPublic key infrastructurePURPLE PuTTYPy (cipher)

Q

Q (cipher)QrpffQUAD (cipher)Quadratic sieveQuantum coin flippingQuantum cryptographyQuantum digital signatureQuantum fingerprintingQuantum key distribution

R

Rabbit (cipher)Rabin cryptosystemRabin–Williams encryption RadioGatúnRail fence cipherRainbow tableRalph MerkleRambutan (cryptography)Random functionRandomness testsRandom number generator attackRandom oracleRC2RC4RC5RC6Rebound attackReciprocal cipherRed/black conceptREDOCRed Pike (cipher)Reflector (cipher machine)Regulation of Investigatory Powers Act 2000ReihenschieberRekeying (cryptography)Related-key attackReplay attackReservehandverfahrenResidual block terminationRijndael key scheduleRijndael S-boxRing signatureRIPEMDRip van Winkle cipherRobert Morris (cryptographer) • Robot certificate authority RockexRolf NoskwithRon RivestRoom 40Root certificateRoss J. AndersonRossignolsROT13Rotor machineRSA RSA • RSA-100 RSA-1024 RSA-110 RSA-120 RSA-129 RSA-130 RSA-140 RSA-150 RSA-1536 RSA-155 RSA-160 RSA-170 RSA-180 RSA-190 RSA-200RSA-2048 RSA-210 RSA-220 RSA-230 RSA-232 RSA-240 RSA-250RSA-260 RSA-270 RSA-280 RSA-290 RSA-300 RSA-309 RSA-310 RSA-320 RSA-330 RSA-340 RSA-350 RSA-360 RSA-370 RSA-380 RSA-390 RSA-400 RSA-410 RSA-420 RSA-430 RSA-440 RSA-450 RSA-460 RSA-470 RSA-480 RSA-490 RSA-500 RSA-576 RSA-617 RSA-640 RSA-704RSA-768 RSA-896 RSA-PSS RSA Factoring ChallengeRSA problemRSA Secret-Key ChallengeRSA SecurityRubber-hose cryptanalysisRunning key cipherRussian copulation

S

S-1 block cipher SAFERSalsa20Salt (cryptography)SAM card Security Support Provider InterfaceSAMLSAVILLESC2000Schnorr groupSchnorr signatureSchoof–Elkies–Atkin algorithmSCIPScott VanstoneScramblerScramdiskScream (cipher)ScryptScytaleSeahorse (software)SEAL (cipher)Sean Murphy (cryptographer)SECGSecret broadcastSecret decoder ringSecrets and Lies (Schneier)Secret sharingSectéra Secure ModuleSecure access moduleSecure channelSecure Communication based on Quantum CryptographySecure copySecure cryptoprocessorSecure Electronic TransactionSecure Hash AlgorithmsSecure Hypertext Transfer ProtocolSecure key issuing cryptographySecure multi-party computationSecure Neighbor DiscoverySecure Real-time Transport ProtocolSecure remote password protocolSecure ShellSecure telephoneSecure Terminal EquipmentSecure voiceSecurIDSecurity associationSecurity engineeringSecurity levelSecurity parameterSecurity protocol notationSecurity through obscuritySecurity tokenSEEDSelected Areas in CryptographySelf-certifying File SystemSelf-shrinking generatorSelf-signed certificateSemantic securitySerge VaudenaySerpent (cipher)Session keySHACALShafi GoldwasserSHA-1SHA-2SHA-3Shared secretSHARKShaun WylieShor's algorithmShrinking generatorShugborough inscriptionSide-channel attackSiemens and Halske T52SIGABASIGCUMSIGINTSignal ProtocolSignal Intelligence ServiceSigncryption SIGSALYSILC (protocol)Silvio MicaliSimple Authentication and Security LayerSimple public-key infrastructure Simple XOR cipher S/KEYSkein (hash function)Skipjack (cipher)Slide attackSlidexSmall subgroup confinement attackS/MIMESM4 algorithm (formerly SMS4) • Snake oil (cryptography)SnefruSNOWSnuffle SOBER-128Solitaire (cipher)Solomon KullbackSOSEMANUKSpecial Collection ServiceSpectr-H64SPEKE (cryptography)Sponge functionSPNEGOSquare (cipher)Ssh-agentSsh-keygenSSH File Transfer ProtocolSSLeayStafford TavaresStandard model (cryptography)Station CASTStation HYPOStation-to-Station protocolStatistical cryptanalysis Stefan LucksSteganalysisSteganographyStraddling checkerboardStream cipherStream cipher attacksStrong cryptographyStrong RSA assumptionStuart Milner-BarrySTU-IISTU-IIIStunnelSubstitution boxSubstitution cipherSubstitution–permutation network • Superencryption • Supersingular isogeny key exchangeSwedish National Defence Radio EstablishmentSWIFFTSXAL/MBALSymmetric-key algorithmSYSKEY

T

Tabula rectaTaher ElgamalTamper resistanceTcpcryptTelevision encryptionTEMPEST • Template:Cryptographic software Temporal Key Integrity ProtocolTesteryThawteThe Alphabet CipherThe Code BookThe CodebreakersThe Gold-BugThe Magic Words are Squeamish Ossifrage • Theory of Cryptography Conference • The world wondersThomas JakobsenThree-pass protocolThreshold shadow scheme TICOMTiger (cryptography)Timeline of cryptographyTime/memory/data tradeoff attackTime-based One-time Password algorithm (TOTP) • Timing attackTiny Encryption AlgorithmTom BersonTommy Flowers • Topics in cryptography • Tor (anonymity network)Torus-based cryptographyTraffic analysisTraffic-flow security Traitor tracingTransmission securityTransport Layer SecurityTransposition cipherTrapdoor functionTrench codeTreyferTrifid cipherTriple DESTrivium (cipher)TrueCryptTruncated differential cryptanalysisTrusted third partyTuring (cipher)TWINKLETWIRLTwofishTwo-square cipherType 1 encryptionType 2 encryptionType 3 encryption Type 4 encryption Typex

U

UES (cipher)UltraUMACUnbalanced Oil and VinegarUndeniable signatureUnicity distanceUniversal composabilityUniversal one-way hash function (UOWHF)

V

Venona projectVerifiable secret sharingVerisignVery smooth hashVESTVIC cipherVideoCryptVigenère cipherVincent RijmenVINSONVirtual private networkVisual cryptographyVoynich manuscript

W

Wadsworth's cipherWAKEWLAN Authentication and Privacy InfrastructureWatermark (data file)Watermarking attackWeak keyWeb of trustWhirlpool (hash function)Whitfield DiffieWide Mouth Frog protocolWi-Fi Protected AccessWilliam F. FriedmanWilliam Montgomery (cryptographer)WinSCPWired Equivalent PrivacyWireless Transport Layer SecurityWitness-indistinguishable proof • Workshop on Cryptographic Hardware and Embedded Systems • World War I cryptographyWorld War II cryptographyW. T. Tutte

X

X.509XDH assumption Xiaoyun WangXML EncryptionXML SignaturexmxXSL attackXTEAXTRXuejia LaiXXTEA 10-00-00-00-00

Y

Yarrow algorithmY-stationsYuliang Zheng

Z

ZeroisationZero-knowledge password proofZero-knowledge proofZfoneZodiac (cipher)ZRTPZimmermann–Sassaman key-signing protocolZimmermann Telegram

See also

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.