Index of cryptography articles

Articles related to cryptography include:

0–9

3-D Secure3-subset meet-in-the-middle attack3-Way40-bit encryption56-bit encryption5-UCO

A

A5/1A5/2ABA digital signature guidelinesABC (stream cipher)Abraham SinkovAcoustic cryptanalysisAdaptive chosen-ciphertext attackAdaptive chosen plaintext and chosen ciphertext attackAdvantage (cryptography)ADFGVX cipherAdi ShamirAdvanced Access Content SystemAdvanced Encryption StandardAdvanced Encryption Standard processAdversaryAEAD block cipher modes of operationAffine cipherAgnes Meyer DriscollAKA (security)Akelarre (cipher)Alan TuringAlastair DennistonAl Bhed languageAlex BiryukovAlfred MenezesAlgebraic EraserAlgorithmically random sequenceAlice and BobAll-or-nothing transformAlphabetum KaldeorumAlternating step generatorAmerican Cryptogram AssociationAN/CYZ-10Anonymous Internet bankingAnonymous publicationAnonymous remailerAntoni PalluthAnubis (cipher)Argon2ARIA (cipher)Arlington HallArne BeurlingArnold CipherArray controller based encryptionArthur ScherbiusArvid Gerhard DammAsiacryptAtbashAttack modelAuguste KerckhoffsAuthenticated encryptionAuthenticationAuthorization certificateAutokey cipherAvalanche effect

B

B-DienstBabington PlotBaby-step giant-stepBacon's cipherBanburismusBart PreneelBaseKingBassOmaticBATONBB84Beale ciphersBEAR and LION ciphersBeaufort cipherBeaumanor HallBent functionBerlekamp–Massey algorithmBernstein v. United StatesBestCryptBiclique attackBID/60BID 770Bifid cipherBill WeisbandBinary Goppa codeBiometric word listBirthday attackBit-flipping attackBitTorrent protocol encryptionBiuro SzyfrówBlack ChamberBlaise de VigenèreBletchley ParkBlind credentialBlinding (cryptography)Blind signatureBlock cipherBlock cipher mode of operationBlock size (cryptography)Blowfish (cipher)Blum Blum ShubBlum–Goldwasser cryptosystemBomba (cryptography)BombeBook cipherBooks on cryptographyBoomerang attackBoris HagelinBouncy Castle (cryptography)Broadcast encryptionBruce SchneierBrute-force attackBrute Force: Cracking the Data Encryption StandardBurrows–Abadi–Needham logicBurt Kaliski

C

C2NetC-36 (cipher machine)C-52 (cipher machine)CAcert.orgCaesar cipherCamellia (cipher)CAPICOMCapstone (cryptography)Cardan grilleCard catalog (cryptology)Carlisle AdamsCAST-128CAST-256Cayley–Purser algorithmCBC-MACCCM modeCCMPCD-57CDMFCellular Message Encryption AlgorithmCentibanCentral Security ServiceCentre for Applied Cryptographic ResearchCentral BureauCerticomCertificate authorityCertificate-based encryptionCertificateless cryptographyCertificate revocation listCertificate signing requestCertification path validation algorithmChaffing and winnowingChallenge-Handshake Authentication ProtocolChallenge–response authenticationChosen-ciphertext attackChosen-plaintext attackCIKS-1Cipher diskCipher runesCipher security summaryCipherSaberCiphertext expansionCiphertext indistinguishabilityCiphertext-only attackCiphertext stealingCIPHERUNICORN-ACIPHERUNICORN-EClassical cipherClaude ShannonClaw-free permutationCleartextCLEFIAClifford CocksClipper chipClock (cryptography)Clock driftCMVPCOCONUT98CodebookCode (cryptography)Code talkerCodress messageCold boot attackCollision attackCollision resistanceColossus computerCombined Cipher MachineCommitment schemeCommon Scrambling AlgorithmCommunications securityCommunications Security EstablishmentCommunication Theory of Secrecy SystemsComparison of disk encryption softwareComparison of SSH clientsCompleteness (cryptography)Complexity trapComputational Diffie–Hellman assumptionComputational hardness assumptionComputer insecurityComputer and network surveillanceCOMSEC equipmentConch (SSH)Concrete securityConel Hugh O'Donel AlexanderConfidentialityConfusion and diffusionContent-scrambling systemControlled Cryptographic ItemCorkscrew (program)Correlation immunityCOSICCovert channelCover (telecommunications)Crab (cipher)Cramer–Shoup cryptosystemCRAM-MD5CRHFCrib (cryptanalysis)CrossCryptCrowdsCrypt (C)CryptanalysisCryptanalysis of the EnigmaCryptanalysis of the Lorenz cipherCryptanalytic computerCryptexCrypticoCrypto AGCrypto-anarchismCrypto API (Linux)Microsoft CryptoAPICryptoBuddyCryptochannelCRYPTO (conference)CryptogramCryptographically Generated AddressCryptographically secure pseudorandom number generatorCryptographically strongCryptographic Application Programming InterfaceCryptographic engineeringCryptographic hash functionCryptographic key typesCryptographic Message SyntaxCryptographic primitiveCryptographic protocolCryptographic Service ProviderCryptographie indéchiffrableCryptographyCryptography in JapanCryptography newsgroupsCryptography standardsCrypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital AgeCryptologiaCryptology ePrint ArchiveCryptology Research Society of IndiaCryptomathicCryptomeCryptomeria cipherCryptonomiconCrypToolCrypto phoneCrypto-societyCryptosystemCryptovirologyCRYPTRECCS-CipherCurve25519Custom hardware attackCycles per byteCyclometerCypherpunkCyrillic Projector

D

D'Agapeyeff cipherDaniel J. BernsteinData Authentication AlgorithmData Encryption StandardDatagram Transport Layer SecurityDavid ChaumDavid KahnDavid NaccacheDavid WagnerDavid Wheeler (computer scientist)Davies attackDavies–Meyer hashDEALDecimal sequences for cryptographyDeciphermentDecisional Diffie–Hellman assumptionDecorrelation theoryDecryptDeCSSDefence Signals DirectorateDegree of anonymityDelegated Path DiscoveryDelegated Path ValidationDeniable encryptionDerek TauntDerived unique key per transactionDES ChallengesDES supplementary materialDES-XDeterministic encryptionDFC (cipher)Dictionary attackDifferential cryptanalysisDifferential-linear attackDifferential power analysisDiffie–Hellman key exchangeDiffie–Hellman problemDigiCipher 2Digital FortressDigital rights managementDigital signatureDigital Signature AlgorithmDigital signature forgeryDigital timestampingDigital watermarkingDilly KnoxDining cryptographers problemDiplomatic bagDirect Anonymous AttestationDiscrete logarithmDisk encryptionDisk encryption hardwareDisk encryption softwareDistance-bounding protocolDistinguishing attackDistributed.netDMA attackdm-cryptDmitry SklyarovDomainKeysDon CoppersmithDorabella CipherDouble Ratchet AlgorithmDoug StinsonDragon (cipher)DRYADDual_EC_DRBGDvorak encoding

E

E0 (cipher)E2 (cipher)E4MEAP-AKAEAP-SIMEAX modeECC patentsECHELONECRYPTEdouard Fleissner von WostrowitzEdward HebernEdward ScheidtEdward TravisEFF DES crackerEfficient Probabilistic Public-Key Encryption SchemeEKMSElectronic Communications Act 2000Electronic moneyElectronic signatureElectronic votingElGamal encryptionElGamal signature schemeEli BihamElizebeth FriedmanElliptic-curve cryptographyElliptic-curve Diffie–HellmanElliptic Curve DSAElliptic curve only hashElonka DuninEncrypted functionEncrypted key exchangeEncrypting File SystemEncryptionEncryption softwareEnigmailEnigma machineEnigma rotor detailsEntrustErnst FetterleineSTREAMÉtienne BazeriesEurocryptEuroCryptExport of cryptographyExtensible Authentication Protocol

F

Fast Software EncryptionFast syndrome-based hashFEA-MFEALFeige–Fiat–Shamir identification schemeFeistel cipherFélix DelastelleFialkaFilesystem-level encryptionFileVaultFill deviceFinancial cryptographyFIPS 140FIPS 140-2Firefly (key exchange protocol)FISH (cipher)Fish (cryptography)FloradoraFluhrer, Mantin and Shamir attackFormat-preserving encryptionFortezzaFort George G. MeadeFortuna (PRNG)Four-square cipherFranciszek PokornyFrank A. StevensonFrank RowlettFreenetFreeOTFEFreeS/WANFrequency analysisFriedrich KasiskiFritz-chipFROGFROSTBURGFTP over SSHFull disk encryptionFull Domain HashF. W. Winterbotham

G

Galois/Counter ModeGardening (cryptanalysis)GCHQ BudeGCHQ CSO MorwenstowGDESGeneric Security Services Application Program InterfaceGeorge BlakleyGeorge ScovellGGH encryption schemeGGH signature schemeGilbert VernamGMR (cryptography)GNU Privacy GuardGnuTLSGoldwasser–Micali cryptosystemGordon WelchmanGOST (block cipher)GOST (hash function)Government Communications HeadquartersGovernment Communications Security BureauGrain (cipher)Grand Cru (cipher)Great CipherGrill (cryptology)Grille (cryptography)Group-based cryptographyGroup signatureGrover's algorithmGustave BertrandGwido Langer

H

H.235HAIFA constructionHAIPEHans DobbertinHans-Thilo SchmidtHard-core predicateHardware random number generatorHardware security moduleHarold KeenHarry HinsleyHarvest (computer)HAS-160Hash-based cryptographyHashcashHash chainHash function security summaryHash listHasty Pudding cipherHAVALHC-256HC-9Heath Robinson (codebreaking machine)Hebern rotor machineHenri BraqueniéHenryk ZygalskiHerbert YardleyHidden Field EquationsHideki ImaiHierocryptHigh-bandwidth Digital Content ProtectionHigher-order differential cryptanalysisHill cipherHistory of cryptographyHMACHMAC-based One-time Password algorithm (HOTP) • Horst FeistelHoward HeysHttpsHugo HadwigerHugo KochHushmailHut 6Hut 8HX-63Hybrid cryptosystemHyperelliptic curve cryptographyHyper-encryption

I

Ian GoldbergIBM 4758ICE (cipher)ID-based cryptographyIDEA NXTIdentification friend or foeIEEE 802.11iIEEE P1363I. J. GoodIllegal primeImpossible differential cryptanalysisIndex of coincidenceIndifferent chosen-ciphertext attackIndocryptInformation leakageInformation Security GroupInformation-theoretic securityInitialization vectorInteger factorizationIntegral cryptanalysisIntegrated Encryption SchemeIntegrated Windows AuthenticationInterlock protocolIntermediate certificate authoritiesInternational Association for Cryptologic ResearchInternational Data Encryption AlgorithmInternet Key ExchangeInternet Security Association and Key Management ProtocolInterpolation attackInvisible inkIPsecIraqi block cipherISAAC (cipher)ISO 19092-2 • ISO/IEC 9797 • Ivan Damgård

J

Jacques SternJADE (cypher machine)James GilloglyJames H. EllisJames MasseyJan GralińskiJan KowalewskiJapanese naval codesJava Cryptography ArchitectureJefferson diskJennifer SeberryJerzy RóżyckiJoan DaemenJohannes TrithemiusJohn HerivelJohn Kelsey (cryptanalyst)John R. F. JeffreysJohn TiltmanJon Lech JohansenJosef PieprzykJoseph DeschJoseph Finnegan (cryptographer)Joseph MauborgneJoseph RochefortJournal of CryptologyJunger v. Daley

K

Kaisa NybergKalyna (cipher)Kasiski examinationKASUMIKCDSAKeePassKerberos (protocol)Kerckhoffs's principleKevin McCurley (cryptographer)Key-agreement protocolKey authenticationKey clusteringKey (cryptography)Key derivation functionKey distribution centerKey escrowKey exchangeKeyfileKey generationKey generatorKey management • Keymat • Key-recovery attackKey scheduleKey server (cryptographic)Key signature (cryptography)KeysigningKey signing partyKey sizeKey space (cryptography)KeystreamKey stretchingKey whiteningKG-84KHAZADKhufu and KhafreKiss (cryptanalysis)KL-43KL-51KL-7KleptographyKN-CipherKnapsack problemKnown-key distinguishing attackKnown-plaintext attackKnownSafeKOI-18KOV-14KryhaKryptosKSD-64KupynaKuznyechikKW-26KW-37KY-3KY-57KY-58KY-68KYK-13

L

LacidaLadder-DESLamport signatureLars KnudsenLattice-based cryptographyLaurance SaffordLawrie BrownLCS35Leo MarksLeonard AdlemanLeon Battista AlbertiLeo RosenLeslie YoxallLEVIATHAN (cipher)LEX (cipher)Libelle (cipher)Linear cryptanalysisLinear-feedback shift registerLink encryptionList of ciphertextsList of cryptographersList of cryptographic file systemsList of cryptographic key typesList of cryptology conferencesList of invited speakers at cryptology conferencesList of telecommunications encryption termsList of people associated with Bletchley ParkList of SFTP clientsList of SFTP server softwareLOKILOKI97Lorenz cipherLouis W. TordellaLshLucifer (cipher)Lyra2

M

M6 (cipher)M8 (cipher)M-209M-325M-94MacGuffin (cipher)MadrygaMAGENTAMagic (cryptography)Maksymilian CiężkiMalcolm J. WilliamsonMalleability (cryptography)Man-in-the-middle attackMarian RejewskiMARS (cryptography)Martin HellmanMaruTukkuMassey–Omura cryptosystemMatt BlazeMatt RobshawMax NewmanMcEliece cryptosystemmcryptMD2 (cryptography)MD4MD5MD5CRKMDC-2MDS matrixMean shortest distanceMeet-in-the-middle attackMental pokerMercury (cipher machine)Mercy (cipher)Meredith GardnerMerkle signature schemeMerkle–Damgård constructionMerkle–Hellman knapsack cryptosystemMerkle's PuzzlesMerkle treeMESH (cipher)Message authenticationMessage authentication codeMessage forgeryMI8Michael LubyMICKEYMicrodotMilitary Cryptanalysis (book) (William F. Friedman)Military CryptanalyticsMimic functionMirror writingMISTY1Mitsuru MatsuiMMB (cipher)Mod n cryptanalysisMQVMS-CHAPMUGIMULTI-S01MultiSwapMultivariate cryptography

N

National Communications CentreNational Cryptologic MuseumNational Security AgencyNational Cipher ChallengeNavajo INeal KoblitzNeedham–Schroeder protocolNegligible functionNEMA (machine)NESSIENetwork Security ServicesNeural cryptographyNew Data SealNewDESN-HashNicolas CourtoisNiederreiter cryptosystemNiels FergusonNigel de GreyNihilist cipherNikita BorisovNimbus (cipher)NIST hash function competitionNonlinear-feedback shift registerNOEKEONNon-malleable codesNoreenNothing up my sleeve numberNSA cryptographyNSA encryption systemsNSA in fictionNSAKEYNSA Suite A CryptographyNSA Suite B CryptographyNT LAN ManagerNTLMSSP • NTRU Cryptosystems, Inc. • NTRUEncryptNTRUSignNull cipherNumbers stationNUSHNTRU

O

Oblivious transferOCB modeOded GoldreichOff-the-Record MessagingOkamoto–Uchiyama cryptosystemOMI cryptographOMNI (SCIP)One-key MACOne-time padOne-time passwordOne-way compression functionOne-way functionOnion routingOnline Certificate Status ProtocolOP-20-GOpenPGP cardOpenSSHOpenSSLOpenswanOpenVPNOperation RuthlessOptimal asymmetric encryption paddingOver the Air Rekeying (OTAR) • OTFEOtway–Rees protocol

P

Padding (cryptography)Padding oracle attackPaillier cryptosystemPairing-based cryptographyPanama (cryptography)Partitioning cryptanalysisPassive attackPassphrasePasswordPassword-authenticated key agreementPassword crackingPassword Hashing CompetitionPaul KocherPaulo PancatuccioPaulo S. L. M. BarretoPaul van OorschotPBKDF2PC BrunoPerfect forward secrecyPerforated sheetsPermutation cipherPeter Gutmann (computer scientist)Peter JungerPeter TwinnPGP CorporationPGPDiskPGPfonePhelixPhil ZimmermannPhoturis (protocol)Physical securityPhysical unclonable functionPig LatinPigpen cipherPike (cipher)Piling-up lemmaPinwheel (cryptography)Piotr SmoleńskiPirate decryptionPKC (conference)PKCSPKCS 11PKCS 12PKIXPlaintextPlaintext-aware encryptionPlayfair cipherPlugboardPMAC (cryptography)Poem codePohlig–Hellman algorithmPoint-to-Point Tunneling ProtocolPointcheval–Stern signature algorithmPoly1305Polyalphabetic cipherPolybius squarePortexPost-quantum cryptographyPost-Quantum Cryptography StandardizationPower analysisPreimage attackPre-shared keyPretty Good PrivacyPrinter steganographyPrivacy-enhanced Electronic MailPrivate Communications TechnologyPrivate information retrievalProbabilistic encryptionProduct cipherProof-of-work systemProtected Extensible Authentication ProtocolProvable securityProvably secure cryptographic hash functionProxy re-encryptionPseudo-Hadamard transformPseudonymityPseudorandom functionPseudorandom number generatorPseudorandom permutationPublic key certificatePublic-key cryptographyPublic key fingerprintPublic key infrastructurePURPLEPuTTYPy (cipher)

Q

Q (cipher)QrpffQUAD (cipher)Quadratic sieveQuantum coin flippingQuantum cryptographyQuantum digital signatureQuantum fingerprintingQuantum key distribution

R

Rabbit (cipher)Rabin cryptosystemRabin–Williams encryptionRadioGatúnRail fence cipherRainbow tableRalph MerkleRambutan (cryptography)Random functionRandomness testsRandom number generator attackRandom oracleRC2RC4RC5RC6Rebound attackReciprocal cipherRed/black conceptREDOCRed Pike (cipher)Reflector (cipher machine)Regulation of Investigatory Powers Act 2000ReihenschieberRekeying (cryptography)Related-key attackReplay attackReservehandverfahrenResidual block terminationRijndael key scheduleRijndael S-boxRing signatureRIPEMDRip van Winkle cipherRobert Morris (cryptographer)Robot certificate authorityRockexRolf NoskwithRon RivestRoom 40Root certificateRoss J. AndersonRossignolsROT13Rotor machineRSA RSA| • RSA-100RSA-1024RSA-110RSA-120RSA-129RSA-130RSA-140RSA-150RSA-1536RSA-155RSA-160RSA-170RSA-180RSA-190RSA-200RSA-2048RSA-210RSA-220RSA-230RSA-232RSA-240RSA-250RSA-260RSA-270RSA-280RSA-290RSA-300RSA-309RSA-310RSA-320RSA-330RSA-340RSA-350RSA-360RSA-370RSA-380RSA-390RSA-400RSA-410RSA-420RSA-430RSA-440RSA-450RSA-460RSA-470RSA-480RSA-490RSA-500RSA-576RSA-617RSA-640RSA-704RSA-768RSA-896RSA-PSSRSA Factoring ChallengeRSA problemRSA Secret-Key ChallengeRSA SecurityRubber-hose cryptanalysisRunning key cipherRussian copulation

S

S-1 block cipherSAFERSalsa20Salt (cryptography)SAM cardSecurity Support Provider InterfaceSAMLSAVILLESC2000Schnorr groupSchnorr signatureSchoof–Elkies–Atkin algorithmSCIPScott VanstoneScramblerScramdiskScream (cipher)ScryptScytaleSeahorse (software)SEAL (cipher)Sean Murphy (cryptographer)SECGSecret broadcastSecret decoder ringSecrets and Lies (Schneier)Secret sharingSectéra Secure ModuleSecure access moduleSecure channelSecure Communication based on Quantum CryptographySecure copySecure cryptoprocessorSecure Electronic TransactionSecure Hash AlgorithmsSecure Hypertext Transfer ProtocolSecure key issuing cryptographySecure multi-party computationSecure Neighbor DiscoverySecure Real-time Transport ProtocolSecure remote password protocolSecure ShellSecure telephoneSecure Terminal EquipmentSecure voiceSecurIDSecurity associationSecurity engineeringSecurity levelSecurity parameterSecurity protocol notationSecurity through obscuritySecurity tokenSEEDSelected Areas in CryptographySelf-certifying File System • Self-certifying key • Self-shrinking generatorSelf-signed certificateSemantic securitySerge VaudenaySerpent (cipher)Session keySHACALShafi GoldwasserSHA-1SHA-2SHA-3Shared secretSHARKShaun WylieShor's algorithmShrinking generatorShugborough inscriptionSide-channel attackSiemens and Halske T52SIGABASIGCUMSIGINTSignal ProtocolSignal Intelligence ServiceSigncryptionSIGSALYSILC (protocol)Silvio MicaliSimple Authentication and Security LayerSimple public-key infrastructureSimple XOR cipherS/KEYSkein (hash function)Skipjack (cipher)Slide attackSlidexSmall subgroup confinement attackS/MIMESM4 algorithm (formerly SMS4) • Snake oil (cryptography)SnefruSNOWSnuffleSOBER-128Solitaire (cipher)Solomon KullbackSOSEMANUKSpecial Collection ServiceSpectr-H64SPEKE (cryptography)Sponge functionSPNEGOSquare (cipher)Ssh-agentSSH File Transfer ProtocolSSLeayStafford Tavares • Ståle Schumacher Ytteborg • Standard model (cryptography)Station CASTStation HYPOStation-to-Station protocolStatistical cryptanalysisStefan LucksSteganalysisSteganographyStraddling checkerboardStream cipherStream cipher attacksStrong cryptographyStrong RSA assumptionStuart Milner-BarrySTU-IISTU-IIIStunnelSubstitution boxSubstitution cipherSubstitution–permutation networkSuperencryptionSupersingular isogeny key exchangeSwedish National Defence Radio EstablishmentSWIFFTSXAL/MBALSymmetric-key algorithmSYSKEY

T

Tabula rectaTaher ElgamalTamper resistanceTcpcryptTelevision encryptionTEMPEST • Template:Cryptographic software • Temporal Key Integrity ProtocolTesteryThawteThe Alphabet CipherThe Code BookThe CodebreakersThe Gold-BugThe Magic Words are Squeamish OssifrageTheory of Cryptography ConferenceThe world wondersThomas JakobsenThree-pass protocolThreshold shadow schemeTICOMTiger (cryptography)Timeline of cryptographyTime/memory/data tradeoff attackTime-based One-time Password algorithm (TOTP) • Timing attackTiny Encryption AlgorithmTom BersonTommy FlowersTopics in cryptographyTor (anonymity network)Torus-based cryptographyTraffic analysisTraffic-flow securityTraitor tracingTransmission securityTransport Layer SecurityTransposition cipherTrapdoor functionTrench codeTreyferTrifid cipherTriple DESTrivium (cipher)TrueCryptTruncated differential cryptanalysisTrusted third partyTuring (cipher)TWINKLETWIRLTwofishTwo-square cipherType 1 encryptionType 2 encryptionType 3 encryptionType 4 encryptionTypex

U

UES (cipher)UltraUMACUnbalanced Oil and VinegarUndeniable signatureUnicity distanceUniversal composabilityUniversal one-way hash function (UOWHF)

V

Venona projectVerifiable secret sharingVerisignVery smooth hashVESTVIC cipherVideoCryptVigenère cipherVincent RijmenVINSONVirtual private networkVisual cryptographyVoynich manuscript

W

Wadsworth's cipherWAKEWLAN Authentication and Privacy InfrastructureWatermark (data file)Watermarking attackWeak keyWeb of trustWhirlpool (hash function)Whitfield DiffieWide Mouth Frog protocolWi-Fi Protected AccessWilliam F. FriedmanWilliam Montgomery (cryptographer)WinSCPWired Equivalent PrivacyWireless Transport Layer SecurityWitness-indistinguishable proofWorkshop on Cryptographic Hardware and Embedded SystemsWorld War I cryptographyWorld War II cryptographyW. T. Tutte

X

X.509XDH assumptionXenon (cipher)Xiaoyun WangXML EncryptionXML SignaturexmxXSL attackXTEAXTRXuejia LaiXXTEA

Y

Yarrow algorithmY-stationsYuliang Zheng

Z

ZeroisationZero-knowledge password proofZero-knowledge proofZfoneZodiac (cipher)ZRTPZimmermann–Sassaman key-signing protocolZimmermann Telegram

See also

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.