Index of cryptography articles

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Articles related to cryptography include:

0-9[edit]

3-D Secure 3-Way 40-bit encryption 56-bit encryption 5-UCO

A[edit]

A5/1 A5/2 ABA digital signature guidelines ABC (stream cipher) Abraham Sinkov Acoustic cryptanalysis Adaptive chosen-ciphertext attack Adaptive chosen plaintext and chosen ciphertext attack Advantage (cryptography) ADFGVX cipher Adi Shamir Advanced Access Content System Advanced Encryption Standard Advanced Encryption Standard process Adversary AEAD block cipher modes of operation Affine cipher Agnes Meyer Driscoll AKA (security) Akelarre (cipher) Alan Turing Alastair Denniston Al Bhed language Alex Biryukov Alfred Menezes Alice and Bob All-or-nothing transform Alphabetum Kaldeorum Alternating step generator American Cryptogram Association AN/CYZ-10 Anonymous internet banking Anonymous publication Anonymous remailer Antoni Palluth Anubis (cipher) ARIA (cipher) Arlington Hall Arne Beurling Arnold Cipher Arthur Scherbius Arvid Gerhard Damm Asiacrypt Atbash Attack model Auguste Kerckhoffs Authenticated encryption Authentication Authorization certificate Autokey cipher Avalanche effect

B[edit]

B-Dienst Babington Plot Baby-step giant-step Bacon's cipher Banburismus Bart Preneel BaseKing BassOmatic BATON BB84 Beale ciphers Beaufort cipher Beaumanor Hall Bent function Berlekamp–Massey algorithm Bernstein v. United States BestCrypt BID/60 BID 770 Bifid cipher Bill Weisband Biometric word list Birthday attack Bit-flipping attack BitTorrent protocol encryption Biuro Szyfrów Black Chamber Blaise de Vigenère Bletchley Park Blind credential Blinding (cryptography) Blind signature Block cipher Block cipher modes of operation Block cipher security summary Block size (cryptography) Blowfish (cipher) Blum Blum Shub Blum–Goldwasser cryptosystem Bomba (cryptography) Bombe Book cipher Books on cryptography Boomerang attack Boris Hagelin Bouncy castle (cryptography) Broadcast encryption Bruce Schneier Brute force attack Brute Force: Cracking the Data Encryption Standard Burrows–Abadi–Needham logic Burt Kaliski

C[edit]

C2Net C-36 (cipher machine) C-52 (cipher machine) CAcert.org Caesar cipher Camellia (cipher) CAPICOM Capstone (cryptography) Cardan grille Card catalog (cryptology) Carlisle Adams CAST-128 CAST-256 Cayley–Purser algorithm CBC-MAC CCM mode CCMP CD-57 CDMF Cellular Message Encryption Algorithm Centiban Central Security Service Centre for Applied Cryptographic Research Central Bureau Certicom Certificate authority Certificate-based encryption Certificateless cryptography Certificate revocation list Certificate signing request Certification path validation algorithm Chaffing and winnowing Challenge-handshake authentication protocol Challenge-response authentication CHES Chosen-ciphertext attack Chosen-plaintext attack CIKS-1 Cipher disk Cipher runes CipherSaber Cipherspace Ciphertext expansion Ciphertext indistinguishability Ciphertext-only attack Ciphertext stealing CIPHERUNICORN-A CIPHERUNICORN-E Classical cipher Claude Elwood Shannon Claw-free permutation Cleartext CLEFIA Clifford Cocks Clipper chip Clock (cryptography) Clock drift CMVP COCONUT98 Codebook Code (cryptography) Code talker Codress message Cold boot attack Collision attack Collision resistance Colossus computer Combined Cipher Machine Commitment scheme Common Scrambling Algorithm Communications security Communications Security Establishment Communication Theory of Secrecy Systems Comparison of disk encryption software Comparison of SSH clients Completeness (cryptography) Complexity trap Computational Diffie–Hellman assumption Computational hardness assumption Computer insecurity Computer surveillance COMSEC equipment Conch (SSH) Concrete security Conel Hugh O'Donel Alexander Confidentiality Confusion and diffusion Content-scrambling system Controlled Cryptographic Item Corkscrew (program) Correlation immunity Covert channel Cover (telecommunications) Crab (cipher) Cramer–Shoup cryptosystem CRAM-MD5 CRHF Crib (cryptanalysis) CrossCrypt Crowds Cryptanalysis Cryptanalysis of the Enigma Cryptanalysis of the Lorenz cipher Cryptanalytic computer Cryptex Cryptico Crypto AG Crypto-anarchism Crypto API (Linux) Microsoft CryptoAPI CryptoBuddy Cryptochannel CRYPTO (conference) Cryptogram Cryptographically Generated Addresses Cryptographically secure pseudorandom number generator Cryptographically strong Cryptographic Application Programming Interface Cryptographic engineering Cryptographic hash function Cryptographic key types Cryptographic Message Syntax Cryptographic primitive Cryptographic protocol Cryptographic Service Provider Cryptographie indéchiffrable Cryptography Cryptography in Japan Cryptography newsgroups Cryptography standards Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age Cryptologia Cryptology ePrint Archive Cryptology Research Society of India Cryptomathic Cryptome Cryptomeria cipher Cryptonomicon CrypTool Crypto phone Crypto-society CryptoStick Cryptosystem Cryptovirology CRYPTREC CS-Cipher Custom hardware attack Cyclometer Cypherpunk Cyrillic Projector

D[edit]

D'Agapeyeff cipher Daniel J. Bernstein Data Authentication Algorithm Data Encryption Standard Datagram Transport Layer Security David Chaum David Kahn David Naccache David Wagner David Wheeler (computer scientist) Davies' attack Davies–Meyer hash DEAL Decimal sequences for cryptography Decipherment Decisional Diffie–Hellman assumption Decorrelation theory Decrypt DeCSS Defence Signals Directorate Degree of anonymity Delegated Path Discovery Delegated Path Validation Deniable encryption Derek Taunt Derived unique key per transaction DES Challenges DES supplementary material DES-X Deterministic encryption DFC (cipher) Dictionary attack Differential cryptanalysis Differential-linear attack Differential power analysis Diffie–Hellman key exchange Diffie–Hellman problem DigiCipher 2 Digital Fortress Digital rights management Digital signature Digital Signature Algorithm Digital timestamping Digital watermarking Dilly Knox Dining cryptographers problem Diplomatic bag Direct anonymous attestation Discrete logarithm Disk encryption Disk encryption hardware Disk encryption software Distance-bounding protocol Distinguishing attack Distributed.net DMA attack dm-crypt Dmitry Sklyarov DomainKeys Don Coppersmith Dorabella Cipher Doug Stinson Dragon (cipher) DRYAD Dvorak encoding

E[edit]

E0 (cipher) E2 (cipher) E4M EAP-AKA EAP-SIM EAX mode ECC patents ECHELON ECRYPT Edouard Fleissner von Wostrowitz Edward Hebern Edward Scheidt Edward Travis EFF DES cracker Efficient Probabilistic Public-Key Encryption Scheme EKMS Electronic Communications Act 2000 Electronic money Electronic signature Electronic voting ElGamal encryption ElGamal signature scheme Eli Biham Elizebeth Friedman Elliptic curve cryptography Elliptic curve Diffie–Hellman Elliptic Curve DSA Elliptic curve only hash Elonka Dunin Filesystem-level encryption Encrypted function Encrypted key exchange Encrypting File System Encryption Encryption software Enigmail Enigma machine Enigma rotor details Entrust Ernst Fetterlein eSTREAM Étienne Bazeries Eurocrypt EuroCrypt Existential forgery Export of cryptography Extensible Authentication Protocol

F[edit]

Fast Software Encryption Fast Syndrome Based Hash FEA-M FEAL Feistel cipher Felix Delastelle Fialka Filesystem-level encryption FileVault Fill device Financial cryptography FIPS 140 FIPS 140-2 FIREFLY Firefly (protocol) FISH (cipher) Fish (cryptography) Floradora Fluhrer, Mantin and Shamir attack Fortezza Fort George G. Meade Fortuna (PRNG) Four-square cipher Franciszek Pokorny Frank A. Stevenson Frank Rowlett Freenet FreeOTFE FreeS/WAN Frequency analysis Friedrich Kasiski Fritz-chip FROG FROSTBURG FTP over SSH Full disk encryption Full Domain Hash F. W. Winterbotham

G[edit]

Galois/Counter Mode Garble Gardening (cryptanalysis) GCHQ CSO Morwenstow GDES George Blakley George Scovell GGH encryption algorithm GGH signature scheme Gilbert Vernam GMR (cryptography) GNU Privacy Guard GnuTLS Goldwasser–Micali cryptosystem Gordon Welchman GOST 28147-89 Gost-Hash Government Communications Headquarters Government Communications Security Bureau Grain (cipher) Grand Cru (cipher) Great Cipher Grill (cryptology) Grille (cryptography) Group-based cryptography Group signature Grover's algorithm Gustave Bertrand Gwido Langer

H[edit]

H.235 HAIPE Hans Dobbertin Hans-Thilo Schmidt Hard-core predicate Hardware random number generator Hardware Security Module Harold Keen Harry Hinsley Harvest (computer) HAS-160 Hashcash Hash chain Hash function security summary Hash list HAVAL HC-256 HC-9 Heath Robinson (codebreaking machine) Hebern rotor machine Henri Braquenié Henryk Zygalski Herbert Yardley Hidden Field Equations Hideki Imai Hierocrypt High-Bandwidth Digital Content Protection Higher-order differential cryptanalysis Hill cipher History of cryptography HMAC Horst Feistel HOTP Howard Heys Https Hugo Hadwiger Hugo Koch Hushmail Hut 6 Hut 8 HX-63 Hyperelliptic curve cryptography Hyper-encryption

I[edit]

Ian Goldberg IBM 4758 ICE (cipher) ID-based cryptography IDEA NXT Identification friend or foe IEEE 802.11i IEEE P1363 I. J. Good ID-based cryptography Illegal prime Impossible differential cryptanalysis Index of coincidence Indifferent chosen-ciphertext attack Indocrypt Information leakage Information Security Group Information theoretic security Initialization vector Integer factorization Integral cryptanalysis Integrated Encryption Scheme Integrated Windows Authentication Interlock Protocol International Association for Cryptologic Research International Data Encryption Algorithm Internet key exchange Internet Security Association and Key Management Protocol Interpolation attack Invisible ink IPsec Iraqi block cipher ISAAC (cipher) ISO 19092-2 Ivan Damgård

J[edit]

Jacques Stern JADE James Gillogly James H. Ellis James Massey Jan Graliński Jan Kowalewski Japanese naval codes Java Cryptography Architecture Jefferson disk Jennifer Seberry Jerzy Różycki Joan Daemen Johannes Trithemius John Herivel John Kelsey (cryptanalyst) John R. F. Jeffreys John Tiltman Jon Lech Johansen Josef Pieprzyk Joseph Desch Joseph Finnegan (cryptographer) Joseph Mauborgne Joseph Rochefort Journal of Cryptology Jpegx Junger v. Daley

K[edit]

Kaisa Nyberg Kasiski examination KASUMI (block cipher) KCDSA KeePass Kerberos (protocol) Kerckhoffs' principle Kevin McCurley (cryptographer) Key-agreement protocol Key authentication Key clustering Key (cryptography) Key derivation function Key distribution center Key escrow Key exchange Keyfile Key generation Key generator Key management Keymat Key schedule Key server (cryptographic) Key signature (cryptography) Keysigning Key signing party Key size Key space (cryptography) Keystream Key strengthening Key whitening KG-84 KHAZAD Khufu and Khafre Kiss (cryptanalysis) KL-43 KL-51 KL-7 KN-Cipher Knapsack problem Known-plaintext attack KnownSafe KOI-18 KOV-14 Kryha Kryptos KSD-64 KW-26 KW-37 KY-3 KY-57 KY-58 KY-68 KYK-13

L[edit]

Lacida Ladder-DES Lamport signature Lars Knudsen Lattice-based cryptography Laurance Safford Lawrie Brown LCS35 Leo Marks Leonard Adleman Leone Battista Alberti Leo Rosen Leslie Yoxall LEVIATHAN (cipher) LEX (cipher) Libelle (cipher) Linear cryptanalysis Linear feedback shift register Link encryption List of cryptographers List of cryptographic file systems List of cryptographic key types List of cryptography topics List of famous ciphertexts List of telecommunications encryption termsList of people associated with Bletchley Park List of SFTP clients List of SFTP server software LOKI LOKI97 Lorenz SZ 40/42 Louis W. Tordella Lsh Lucifer (cipher)

M[edit]

M6 (cipher) M8 (cipher) M-209 M-325 M-94 MacGuffin (cipher) Madryga MAGENTA Magic (cryptography) Maksymilian Ciężki Malcolm J. Williamson Malleability (cryptography) Man-in-the-middle attack Marian Rejewski MARS (cryptography) Martin Hellman MaruTukku Massey-Omura cryptosystem Matt Blaze Matt Robshaw Max Newman McEliece cryptosystem mcrypt MD2 (cryptography) MD4 MD5 MD5CRK MDC-2 MDS matrix Mean Shortest Distance Meet-in-the-middle attack Mental poker Mercury (cipher machine) Mercy (cipher) Meredith Gardner Merkle signature scheme Merkle-Damgård construction Merkle-Hellman knapsack cryptosystem Merkle's Puzzles Merkle tree MESH (cipher) Message authentication code Message forgery Message Integrity Code MI8 Michael Luby MICKEY-128 Microdot Military Cryptanalysis (book) (William F. Friedman) Military Cryptanalytics Mimic function Mirror writing MISTY1 Mitsuru Matsui MMB Mod n cryptanalysis MQV MS-CHAP MUGI MULTI-S01 MultiSwap Multivariate cryptography

N[edit]

National Communications Centre National Cryptologic Museum National Security Agency National Cipher Challenge Navajo I Neal Koblitz Needham–Schroeder Negligible function (cryptography) NEMA (machine) NESSIE Network Security Services Neural cryptography New Data Seal NewDES N-Hash Nicolas Courtois Niederreiter cryptosystem Niels Ferguson Nigel de Grey Nihilist cipher Nikita Borisov Nimbus (cipher) NIST hash function competition NLFSR NOEKEON Noreen Nothing up my sleeve number NSA cryptography NSA encryption systems NSA in fiction NSAKEY NSA Suite A Cryptography NSA Suite B Cryptography NTRU Cryptosystems, Inc. NTRUEncrypt NTRUSign Null cipher Numbers station NUSH NTRU

O[edit]

Oblivious transfer OCB mode Oded Goldreich Off-the-record messaging Okamoto–Uchiyama cryptosystem OMI cryptograph OMNI (SCIP) One-key MAC One-time pad One-time password One-way compression function One-way encryption One-way function One-way permutation Onion routing Online Certificate Status Protocol OP-20-G OpenPGP card OpenSSH OpenSSL Openswan OpenVPN Operation Ruthless Optimal Asymmetric Encryption Padding OTAR OTFE Otway–Rees

P[edit]

Padding (cryptography) Padding oracle attack Paillier cryptosystem Pairing-based cryptography PANAMA Partitioning cryptanalysis Passive attack Passphrase Password Password-authenticated key agreement Password cracking Paul Kocher Paulo Pancatuccio Paulo S. L. M. Barreto Paul van Oorschot PBKDF2 PC Bruno Perfect forward secrecy Perforated sheets Permutation cipher Peter Gutmann (computer scientist) Peter Junger --
Peter Twinn PGP Corporation PGPDisk PGPfone Phelix Phil Zimmermann Photuris (protocol) Physical security Physically Unclonable Function Pig Latin Pigpen cipher Pike (cipher) Piling-up lemma Pinwheel (cryptography) Piotr Smoleński Pirate decryption PKC (conference) PKCS PKCS11 PKCS12 PKIX Plaintext Plaintext-aware encryption Playfair cipher Plugboard PMAC (cryptography) Poem code Pohlig–Hellman algorithm Point-to-point tunneling protocol Pointcheval–Stern signature algorithm --
Poly1305-AES Polyalphabetic cipher Polybius square Portex Post-quantum cryptography Power analysis Preimage attack Pre-shared key Pretty Good Privacy Printer steganography Privacy-enhanced Electronic Mail Private Communications Technology Private information retrieval Probabilistic encryption Product cipher Proof-of-work system Protected Extensible Authentication Protocol Provable security Provably secure cryptographic hash function Proxy re-encryption Pseudo-Hadamard transform Pseudonymity Pseudorandom function Pseudorandom number generator Public key certificate Public-key cryptography Public key fingerprint Public key infrastructure PURPLE PuTTY Py (cipher)

Q[edit]

Q (cipher) Qrpff QUAD (cipher) Quadratic sieve Quantum cryptography Quantum digital signature Quantum fingerprinting

R[edit]

Rabbit (cipher) Rabin cryptosystem Rabin–Williams encryption Rail Fence Cipher Rainbow table Ralph Merkle Rambutan (cryptography) Random function Random number generator attack Random oracle RC2 RC4 RC5 RC6 Reciprocal cipher RED/BLACK concept REDOC Red Pike (cipher) Reflector (cipher machine) Regulation of Investigatory Powers Act 2000 Reihenschieber Rekeying Related-key attack Replay attack Reservehandverfahren Residual block termination Rijndael key schedule Rijndael S-box Ring signature RIPEMD Rip van Winkle cipher Robert Morris (cryptographer) Robot certificate authority Rockex Rolf Noskwith Ron Rivest Room 40 Root certificate Ross J. Anderson Rossignols ROT13 Rotor machine RSA RSA-100 RSA-1024 RSA-110 RSA-120 RSA-129 RSA-130 RSA-140 RSA-150 RSA-1536 RSA-155 RSA-160 RSA-170 RSA-180 RSA-190 RSA-200 RSA-2048 RSA-210 RSA-220 RSA-230 RSA-232 RSA-240 RSA-250 RSA-260 RSA-270 RSA-280 RSA-290 RSA-300 RSA-309 RSA-310 RSA-320 RSA-330 RSA-340 RSA-350 RSA-360 RSA-370 RSA-380 RSA-390 RSA-400 RSA-410 RSA-420 RSA-430 RSA-440 RSA-450 RSA-460 RSA-470 RSA-480 RSA-490 RSA-500 RSA-576 RSA-617 RSA-640 RSA-704 RSA-768 RSA-896 RSA-PSS RSA Factoring Challenge RSA problem RSA Secret-Key Challenge RSA Security Rubber-hose cryptanalysis Running key cipher Russian copulation

S[edit]

S-1 block cipher SAFER Salsa20 Salt (cryptography) SAM card SAML SAVILLE SC2000 Schnorr group Schnorr signature Schoof–Elkies–Atkin algorithm SCIP Scott Vanstone Scrambler Scramdisk Scream (cipher) Scytale Seahorse (software) SEAL (cipher) Sean Murphy (cryptographer) SECG Secret broadcast Secret decoder ring Secrets and Lies (Schneier) Secret sharing Sectéra Secure Module Secure Access Module Secure channel Secure Communication based on Quantum Cryptography Secure copy Secure cryptoprocessor Secure electronic transaction Secure Hash Algorithm Secure hypertext transfer protocol Secure key issuing cryptography Secure multiparty computation Secure Neighbor Discovery Protocol Secure Real-time Transport Protocol Secure remote password protocol Secure Shell Secure telephone Secure Terminal Equipment Secure voice SecurID Security association Security engineering Security parameter Security protocol notation Security through obscurity Security token SEED Selected Areas in Cryptography Self-certifying File System Self-certifying key Self-shrinking generator Self-signed certificate Semantic security Serge Vaudenay Serpent (cipher) Session key SFTPPlus SHACAL Shafi Goldwasser SHA-1 SHA-2 Shared secret SHARK Shaun Wylie Shor's algorithm Shrinking generator Shugborough House inscription Side channel attack Siemens and Halske T52 SIGABA SIGCUM SIGINT Signals Intelligence Service Signcryption SIGSALY SILC (protocol) Silvio Micali Simple Authentication and Security Layer Simple public key infrastructure Simple XOR cipher S/KEY Skipjack (cipher) Slide attack Slidex Small subgroup confinement attack S/MIME SMS4 Snake oil (cryptography) Snefru SNOW Snuffle SOBER-128 Solitaire (cipher) Solomon Kullback SOSEMANUK Special Collection Service Spectr-H64 SPEKE (cryptography) Square (cipher) Ssh-agent SSH file transfer protocol SSLeay Stafford Tavares Ståle Schumacher Ytteborg Station CAST Station HYPO Station-to-Station protocol Statistical cryptanalysis Stefan Lucks Steganalysis Steganography Straddling checkerboard Stream cipher Stream cipher attack Strong cryptography Strong RSA assumption Stuart Milner-Barry STU-II STU-III Stunnel Substitution box Substitution cipher Substitution-permutation network Superencryption Swedish National Defence Radio Establishment SWIFFT SXAL/MBAL Symmetric-key algorithm SYSKEY

T[edit]

Tabula recta Taher Elgamal Tamper resistance Tcpcrypt Television encryption TEMPEST Template:Cryptographic software Temporal Key Integrity Protocol Testery Thawte The Alphabet Cipher The Code Book The Codebreakers The Gold Bug The Magic Words are Squeamish Ossifrage Theory of Cryptography Conference The world wonders Thomas Jakobsen Three-pass protocol Threshold shadow scheme TICOM Tiger (hash) Timeline of cryptography Timing attack Tiny Encryption Algorithm Tom Berson Tommy Flowers Topics in cryptography Tor (anonymity network) Torus-based cryptography Traffic analysis Traffic-flow security Traitor tracing Transmission security Transport Layer Security Transposition cipher Trapdoor function Trench code Treyfer Trifid cipher Triple DES Trivium (cipher) TrueCrypt Truncated differential cryptanalysis Trusted third party Turing (cipher) TWINKLE TWIRL Twofish Two-square cipher Type 1 encryption Type 2 encryption Type 3 encryption Type 4 encryption Typex

U[edit]

UES (cipher) Ultra UMAC Unbalanced Oil and Vinegar Undeniable signature Unicity distance Universal composability UOWHF

V[edit]

VENONA project Verifiable secret sharing VeriSign Very smooth hash VEST VIC cipher VideoCrypt Vigenère cipher Vincent Rijmen VINSON Virtual private network Visual cryptography Voynich manuscript

W[edit]

Wadsworth's cipher WAKE WLAN Authentication and Privacy Infrastructure Watermark (data file) Watermarking attack Weak key Web of trust WHIRLPOOL Whitfield Diffie Wide Mouth Frog Wi-Fi Protected Access William F. Friedman William Montgomery (cryptographer) WinSCP Wired Equivalent Privacy Wireless Transport Layer Security World War I cryptography World War II cryptography W. T. Tutte

X[edit]

X.509 XDH Assumption Xenon (cipher) Xiaoyun Wang XML Encryption XML Signature xmx XSL attack XTEA XTR Xuejia Lai XXTEA

Y[edit]

Yarrow algorithm Y-stations Yuliang Zheng

Z[edit]

Zeroisation Zero-knowledge password proof Zero-knowledge proof Zfone Zodiac (cipher) ZRTP Zimmermann–Sassaman key-signing protocol Zimmermann Telegram

See also[edit]