From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2024-04-01 to 2024-04-30
Total views: 7,300,926
Updated: 12:51, 15 May 2024 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
1,178,938
|
39,297
|
B
|
High
|
2
|
Telegram (software)
|
423,551
|
14,118
|
B
|
Mid
|
3
|
Bitcoin
|
254,546
|
8,484
|
B
|
High
|
4
|
Alan Turing
|
208,019
|
6,933
|
GA
|
Top
|
5
|
Cryptocurrency
|
206,616
|
6,887
|
C
|
High
|
6
|
WikiLeaks
|
116,711
|
3,890
|
B
|
Low
|
7
|
Blockchain
|
116,230
|
3,874
|
B
|
High
|
8
|
HTTPS
|
110,471
|
3,682
|
C
|
High
|
9
|
Tor (network)
|
99,033
|
3,301
|
B
|
Mid
|
10
|
The Imitation Game
|
88,609
|
2,953
|
C
|
Mid
|
11
|
Transport Layer Security
|
79,826
|
2,660
|
B
|
Top
|
12
|
Voynich manuscript
|
73,627
|
2,454
|
B
|
Low
|
13
|
Virtual private network
|
69,166
|
2,305
|
C
|
Mid
|
14
|
National Security Agency
|
67,223
|
2,240
|
C
|
High
|
15
|
Enigma machine
|
65,065
|
2,168
|
C
|
High
|
16
|
RSA (cryptosystem)
|
62,620
|
2,087
|
C
|
Top
|
17
|
Password
|
61,548
|
2,051
|
C
|
Top
|
18
|
Diffie–Hellman key exchange
|
54,540
|
1,818
|
C
|
Top
|
19
|
Advanced Encryption Standard
|
53,605
|
1,786
|
B
|
Top
|
20
|
Changpeng Zhao
|
49,188
|
1,639
|
Start
|
Low
|
21
|
History of bitcoin
|
48,831
|
1,627
|
C
|
Low
|
22
|
Vigenère cipher
|
45,802
|
1,526
|
B
|
Low
|
23
|
SHA-2
|
44,984
|
1,499
|
C
|
Top
|
24
|
Secure Shell
|
44,967
|
1,498
|
C
|
High
|
25
|
HTTP Strict Transport Security
|
44,615
|
1,487
|
C
|
Low
|
26
|
Cryptography
|
42,993
|
1,433
|
C
|
Top
|
27
|
Signal (messaging app)
|
40,868
|
1,362
|
C
|
Mid
|
28
|
Vitalik Buterin
|
39,761
|
1,325
|
C
|
Low
|
29
|
WhatsApp University
|
39,431
|
1,314
|
Start
|
Low
|
30
|
Public-key cryptography
|
39,134
|
1,304
|
C
|
Top
|
31
|
MD5
|
35,975
|
1,199
|
C
|
Top
|
32
|
Block cipher mode of operation
|
34,939
|
1,164
|
C
|
Top
|
33
|
Darknet market
|
34,000
|
1,133
|
B
|
Mid
|
34
|
Dogecoin
|
33,354
|
1,111
|
C
|
Low
|
35
|
Caesar cipher
|
32,841
|
1,094
|
FA
|
High
|
36
|
Zimmermann Telegram
|
32,813
|
1,093
|
B
|
High
|
37
|
Sator Square
|
31,960
|
1,065
|
B
|
Low
|
38
|
Joan Clarke
|
31,844
|
1,061
|
C
|
Mid
|
39
|
Man-in-the-middle attack
|
30,549
|
1,018
|
C
|
Mid
|
40
|
Digital signature
|
29,777
|
992
|
C
|
Top
|
41
|
Knapsack problem
|
29,022
|
967
|
C
|
Mid
|
42
|
Proton Mail
|
28,860
|
962
|
C
|
Low
|
43
|
Encryption
|
28,365
|
945
|
C
|
Top
|
44
|
Information theory
|
27,655
|
921
|
B
|
Top
|
45
|
HMAC
|
26,646
|
888
|
C
|
High
|
46
|
I2P
|
25,725
|
857
|
B
|
Low
|
47
|
Steganography
|
25,501
|
850
|
B
|
High
|
48
|
Active Directory
|
25,089
|
836
|
C
|
Low
|
49
|
Cryptographic hash function
|
25,050
|
835
|
C
|
Top
|
50
|
Claude Shannon
|
25,015
|
833
|
C
|
Top
|
51
|
GCHQ
|
24,876
|
829
|
B
|
Low
|
52
|
SHA-1
|
24,274
|
809
|
C
|
Top
|
53
|
Pretty Good Privacy
|
23,717
|
790
|
B
|
High
|
54
|
Bletchley Park
|
22,672
|
755
|
B
|
High
|
55
|
Elliptic-curve cryptography
|
22,252
|
741
|
C
|
High
|
56
|
NordVPN
|
21,655
|
721
|
C
|
Mid
|
57
|
Zero-knowledge proof
|
21,488
|
716
|
C
|
Top
|
58
|
Digital rights management
|
21,130
|
704
|
B
|
High
|
59
|
Wi-Fi Protected Access
|
21,040
|
701
|
C
|
Mid
|
60
|
Post-quantum cryptography
|
20,804
|
693
|
C
|
High
|
61
|
Trusted Platform Module
|
20,793
|
693
|
C
|
Mid
|
62
|
Certificate authority
|
20,030
|
667
|
C
|
High
|
63
|
Letter frequency
|
19,441
|
648
|
B
|
Low
|
64
|
Merkle tree
|
19,334
|
644
|
C
|
Mid
|
65
|
Information security
|
19,326
|
644
|
B
|
Top
|
66
|
Ross J. Anderson
|
18,586
|
619
|
C
|
Mid
|
67
|
Cipher
|
18,475
|
615
|
C
|
Top
|
68
|
Kerberos (protocol)
|
18,191
|
606
|
C
|
High
|
69
|
Public key infrastructure
|
18,029
|
600
|
C
|
Top
|
70
|
Cryptanalysis of the Enigma
|
17,793
|
593
|
C
|
Mid
|
71
|
Secure Hash Algorithms
|
17,361
|
578
|
Start
|
High
|
72
|
Shiba Inu (cryptocurrency)
|
17,223
|
574
|
Start
|
Low
|
73
|
One-time pad
|
17,205
|
573
|
C
|
Top
|
74
|
ROT13
|
16,890
|
563
|
C
|
Mid
|
75
|
Data Encryption Standard
|
16,573
|
552
|
C
|
Top
|
76
|
Authentication
|
16,280
|
542
|
C
|
High
|
77
|
Hyphanet
|
16,249
|
541
|
B
|
Mid
|
78
|
Homomorphic encryption
|
15,725
|
524
|
C
|
High
|
79
|
Elliptic Curve Digital Signature Algorithm
|
15,565
|
518
|
C
|
High
|
80
|
OpenVPN
|
15,522
|
517
|
C
|
Mid
|
81
|
Keychain (software)
|
15,434
|
514
|
Start
|
Unknown
|
82
|
Rainbow table
|
15,353
|
511
|
C
|
High
|
83
|
Vault 7
|
15,218
|
507
|
C
|
Mid
|
84
|
Bcrypt
|
15,142
|
504
|
C
|
Mid
|
85
|
Code talker
|
14,644
|
488
|
B
|
Low
|
86
|
Bombe
|
14,563
|
485
|
B
|
Mid
|
87
|
One-time password
|
14,522
|
484
|
C
|
Mid
|
88
|
Utah Data Center
|
14,135
|
471
|
C
|
Mid
|
89
|
Galois/Counter Mode
|
14,069
|
468
|
C
|
Mid
|
90
|
Public key certificate
|
13,898
|
463
|
C
|
Top
|
91
|
Phone hacking
|
13,816
|
460
|
Start
|
Mid
|
92
|
SHA-3
|
13,752
|
458
|
Start
|
Mid
|
93
|
OpenSSL
|
13,454
|
448
|
B
|
High
|
94
|
Symmetric-key algorithm
|
13,433
|
447
|
Start
|
Top
|
95
|
Bitcoin Cash
|
13,209
|
440
|
Start
|
Low
|
96
|
Salt (cryptography)
|
13,179
|
439
|
Start
|
High
|
97
|
EdDSA
|
13,122
|
437
|
C
|
High
|
98
|
.onion
|
12,947
|
431
|
C
|
Low
|
99
|
Brute-force attack
|
12,784
|
426
|
C
|
High
|
100
|
SSH File Transfer Protocol
|
12,674
|
422
|
Start
|
Unknown
|
101
|
Alice and Bob
|
12,436
|
414
|
Start
|
Low
|
102
|
Grover's algorithm
|
12,302
|
410
|
C
|
Mid
|
103
|
Mullvad
|
12,279
|
409
|
Start
|
Low
|
104
|
Kryptos
|
12,152
|
405
|
C
|
Low
|
105
|
Integer factorization
|
11,741
|
391
|
B
|
Mid
|
106
|
Colossus computer
|
10,924
|
364
|
B
|
Mid
|
107
|
Ultra (cryptography)
|
10,837
|
361
|
C
|
High
|
108
|
Forward secrecy
|
10,778
|
359
|
C
|
High
|
109
|
Tails (operating system)
|
10,755
|
358
|
Start
|
Low
|
110
|
PBKDF2
|
10,746
|
358
|
C
|
Low
|
111
|
Substitution cipher
|
10,508
|
350
|
Unknown
|
Unknown
|
112
|
Cryptographic nonce
|
10,487
|
349
|
Start
|
High
|
113
|
Shamir's secret sharing
|
10,183
|
339
|
C
|
High
|
114
|
InterPlanetary File System
|
10,178
|
339
|
C
|
Low
|
115
|
Theoretical computer science
|
10,108
|
336
|
B
|
Low
|
116
|
Link 16
|
10,027
|
334
|
Start
|
Low
|
117
|
Comparison of BitTorrent clients
|
9,936
|
331
|
List
|
Low
|
118
|
Apple–FBI encryption dispute
|
9,838
|
327
|
C
|
Low
|
119
|
Differential privacy
|
9,730
|
324
|
C
|
Unknown
|
120
|
Message authentication code
|
9,723
|
324
|
C
|
Top
|
121
|
3-D Secure
|
9,657
|
321
|
Start
|
Low
|
122
|
Fort Meade
|
9,621
|
320
|
C
|
Low
|
123
|
ChaCha20-Poly1305
|
9,612
|
320
|
C
|
Low
|
124
|
Pay television
|
9,454
|
315
|
Start
|
Unknown
|
125
|
Cryptonomicon
|
9,452
|
315
|
C
|
Low
|
126
|
RC4
|
9,424
|
314
|
B
|
Top
|
127
|
Side-channel attack
|
9,424
|
314
|
C
|
High
|
128
|
Authenticated encryption
|
9,302
|
310
|
C
|
Mid
|
129
|
Quantum key distribution
|
9,132
|
304
|
B
|
Mid
|
130
|
Bitwarden
|
8,974
|
299
|
C
|
Low
|
131
|
Curve25519
|
8,969
|
298
|
C
|
High
|
132
|
Cryptanalysis
|
8,907
|
296
|
C
|
High
|
133
|
Self-signed certificate
|
8,850
|
295
|
Start
|
Unknown
|
134
|
Proof of stake
|
8,761
|
292
|
Start
|
Low
|
135
|
Lattice-based cryptography
|
8,656
|
288
|
Start
|
Low
|
136
|
Elliptic-curve Diffie–Hellman
|
8,626
|
287
|
Start
|
Mid
|
137
|
Discrete logarithm
|
8,546
|
284
|
C
|
Mid
|
138
|
Cypherpunk
|
8,503
|
283
|
C
|
Mid
|
139
|
VeraCrypt
|
8,411
|
280
|
C
|
Mid
|
140
|
Playfair cipher
|
8,410
|
280
|
Unknown
|
Unknown
|
141
|
The Tor Project
|
8,317
|
277
|
C
|
Mid
|
142
|
Password manager
|
8,293
|
276
|
C
|
Low
|
143
|
Birthday attack
|
8,162
|
272
|
C
|
High
|
144
|
Beale ciphers
|
8,095
|
269
|
B
|
Low
|
145
|
Triple DES
|
7,972
|
265
|
Start
|
Unknown
|
146
|
Babington Plot
|
7,927
|
264
|
C
|
Low
|
147
|
Matrix (protocol)
|
7,925
|
264
|
Start
|
Unknown
|
148
|
Confidentiality
|
7,917
|
263
|
C
|
Low
|
149
|
Certificate signing request
|
7,832
|
261
|
C
|
Low
|
150
|
PKCS 12
|
7,744
|
258
|
Start
|
Unknown
|
151
|
OpenSSH
|
7,718
|
257
|
C
|
High
|
152
|
Argon2
|
7,698
|
256
|
C
|
Mid
|
153
|
Transposition cipher
|
7,660
|
255
|
Unknown
|
Unknown
|
154
|
Richard Teng
|
7,617
|
253
|
Start
|
Low
|
155
|
Digital Signature Algorithm
|
7,590
|
253
|
C
|
Top
|
156
|
Decentralized finance
|
7,553
|
251
|
Start
|
Low
|
157
|
FIPS 140-2
|
7,390
|
246
|
C
|
Mid
|
158
|
Supply chain attack
|
7,298
|
243
|
C
|
Low
|
159
|
Quantum cryptography
|
7,291
|
243
|
C
|
High
|
160
|
Litecoin
|
7,280
|
242
|
Start
|
Low
|
161
|
ElGamal encryption
|
7,207
|
240
|
Start
|
Top
|
162
|
KeePass
|
7,190
|
239
|
C
|
Low
|
163
|
Citizenfour
|
7,149
|
238
|
C
|
Low
|
164
|
Qubes OS
|
7,087
|
236
|
C
|
Mid
|
165
|
Cipher suite
|
7,013
|
233
|
C
|
Top
|
166
|
Block cipher
|
6,920
|
230
|
C
|
Top
|
167
|
Lavarand
|
6,881
|
229
|
Start
|
Mid
|
168
|
Wired Equivalent Privacy
|
6,869
|
228
|
C
|
Mid
|
169
|
Password strength
|
6,864
|
228
|
C
|
High
|
170
|
RSA Security
|
6,858
|
228
|
C
|
Unknown
|
171
|
Digest access authentication
|
6,840
|
228
|
B
|
Low
|
172
|
GNU Privacy Guard
|
6,830
|
227
|
C
|
Unknown
|
173
|
Conel Hugh O'Donel Alexander
|
6,789
|
226
|
Start
|
Low
|
174
|
Bitconnect
|
6,612
|
220
|
C
|
Low
|
175
|
WebTorrent
|
6,554
|
218
|
Start
|
Unknown
|
176
|
IMSI-catcher
|
6,504
|
216
|
Start
|
Mid
|
177
|
Adam Back
|
6,469
|
215
|
Start
|
Low
|
178
|
Cryptographically secure pseudorandom number generator
|
6,403
|
213
|
C
|
Top
|
179
|
Signal Protocol
|
6,297
|
209
|
C
|
High
|
180
|
Kerckhoffs's principle
|
6,290
|
209
|
Start
|
Mid
|
181
|
Key derivation function
|
6,290
|
209
|
C
|
Low
|
182
|
Len Sassaman
|
6,285
|
209
|
Start
|
Unknown
|
183
|
Lorenz cipher
|
6,248
|
208
|
C
|
Top
|
184
|
Dual EC DRBG
|
6,247
|
208
|
C
|
High
|
185
|
Salsa20
|
6,191
|
206
|
C
|
Top
|
186
|
Stream cipher
|
6,144
|
204
|
Start
|
Top
|
187
|
Blowfish (cipher)
|
6,074
|
202
|
B
|
High
|
188
|
Tap code
|
6,041
|
201
|
Start
|
Low
|
189
|
Units of information
|
5,996
|
199
|
C
|
Unknown
|
190
|
Root certificate
|
5,986
|
199
|
Start
|
Low
|
191
|
Mutual authentication
|
5,961
|
198
|
Stub
|
Low
|
192
|
Rijndael S-box
|
5,846
|
194
|
Start
|
Low
|
193
|
Electronic signature
|
5,837
|
194
|
C
|
Low
|
194
|
Padding (cryptography)
|
5,735
|
191
|
Start
|
Unknown
|
195
|
BLAKE (hash function)
|
5,670
|
189
|
C
|
Mid
|
196
|
Secure multi-party computation
|
5,565
|
185
|
Start
|
High
|
197
|
RSA SecurID
|
5,502
|
183
|
Unknown
|
Unknown
|
198
|
Cryptogram
|
5,478
|
182
|
C
|
Mid
|
199
|
Bitcoin Core
|
5,386
|
179
|
Start
|
Low
|
200
|
Password cracking
|
5,284
|
176
|
C
|
Mid
|
201
|
Initialization vector
|
5,278
|
175
|
C
|
High
|
202
|
XOR cipher
|
5,170
|
172
|
Stub
|
Mid
|
203
|
Certificate revocation list
|
5,073
|
169
|
C
|
Low
|
204
|
Privacy-Enhanced Mail
|
5,020
|
167
|
Start
|
Low
|
205
|
AES instruction set
|
4,999
|
166
|
C
|
Low
|
206
|
TrueCrypt
|
4,979
|
165
|
C
|
Mid
|
207
|
Adi Shamir
|
4,978
|
165
|
Start
|
Unknown
|
208
|
Boolean function
|
4,961
|
165
|
Start
|
Mid
|
209
|
Datagram Transport Layer Security
|
4,952
|
165
|
Start
|
Mid
|
210
|
Polkadot (cryptocurrency)
|
4,928
|
164
|
Start
|
Low
|
211
|
Web of trust
|
4,916
|
163
|
C
|
High
|
212
|
Key (cryptography)
|
4,898
|
163
|
Start
|
Unknown
|
213
|
Deniable encryption
|
4,884
|
162
|
Start
|
High
|
214
|
KeePassXC
|
4,854
|
161
|
Start
|
Low
|
215
|
Feistel cipher
|
4,800
|
160
|
Start
|
Unknown
|
216
|
Automatic Certificate Management Environment
|
4,787
|
159
|
Start
|
Low
|
217
|
11B-X-1371
|
4,786
|
159
|
GA
|
Low
|
218
|
PKCS
|
4,785
|
159
|
List
|
High
|
219
|
Bitcoin scalability problem
|
4,749
|
158
|
C
|
Low
|
220
|
Replay attack
|
4,672
|
155
|
C
|
Top
|
221
|
Fork (blockchain)
|
4,652
|
155
|
Start
|
Mid
|
222
|
Padding oracle attack
|
4,605
|
153
|
Stub
|
Unknown
|
223
|
Diplomatic bag
|
4,602
|
153
|
Start
|
Low
|
224
|
Rail fence cipher
|
4,576
|
152
|
Start
|
Low
|
225
|
Marian Rejewski
|
4,532
|
151
|
FA
|
Mid
|
226
|
Operation Rubicon
|
4,503
|
150
|
C
|
Low
|
227
|
Ciphertext
|
4,486
|
149
|
Start
|
High
|
228
|
Elliptic curve point multiplication
|
4,482
|
149
|
C
|
Mid
|
229
|
Illegal number
|
4,454
|
148
|
C
|
Low
|
230
|
The Doughnut
|
4,401
|
146
|
GA
|
High
|
231
|
Polybius square
|
4,395
|
146
|
Start
|
Mid
|
232
|
AES key schedule
|
4,382
|
146
|
Start
|
Low
|
233
|
History of cryptography
|
4,379
|
145
|
Start
|
High
|
234
|
Frequency analysis
|
4,333
|
144
|
C
|
High
|
235
|
Hill cipher
|
4,281
|
142
|
Unknown
|
Unknown
|
236
|
Bruce Schneier
|
4,224
|
140
|
Start
|
High
|
237
|
Communications Security Establishment
|
4,214
|
140
|
C
|
Mid
|
238
|
Session (software)
|
4,155
|
138
|
Start
|
Low
|
239
|
One-way function
|
4,138
|
137
|
Start
|
Top
|
240
|
Commitment scheme
|
4,138
|
137
|
C
|
High
|
241
|
Challenge–response authentication
|
4,136
|
137
|
Start
|
Mid
|
242
|
Key size
|
4,135
|
137
|
C
|
High
|
243
|
PKCS 7
|
4,086
|
136
|
Start
|
Low
|
244
|
Cold boot attack
|
4,067
|
135
|
C
|
Low
|
245
|
NIST Post-Quantum Cryptography Standardization
|
3,930
|
131
|
C
|
Mid
|
246
|
Blockchain game
|
3,918
|
130
|
Start
|
Low
|
247
|
Daniel J. Bernstein
|
3,893
|
129
|
C
|
Mid
|
248
|
Digital watermarking
|
3,889
|
129
|
B
|
Mid
|
249
|
Non-repudiation
|
3,884
|
129
|
Start
|
Mid
|
250
|
Known-plaintext attack
|
3,884
|
129
|
Start
|
High
|
251
|
List of bitcoin forks
|
3,867
|
128
|
List
|
Low
|
252
|
Cryptocurrency tumbler
|
3,841
|
128
|
Start
|
Unknown
|
253
|
Copiale cipher
|
3,824
|
127
|
Start
|
Low
|
254
|
Bacon's cipher
|
3,787
|
126
|
Start
|
Low
|
255
|
PKCS 1
|
3,787
|
126
|
C
|
Mid
|
256
|
Elizebeth Smith Friedman
|
3,771
|
125
|
C
|
Mid
|
257
|
Code signing
|
3,770
|
125
|
C
|
Low
|
258
|
Book cipher
|
3,751
|
125
|
C
|
Low
|
259
|
David Chaum
|
3,663
|
122
|
C
|
Low
|
260
|
S-box
|
3,650
|
121
|
Start
|
Top
|
261
|
Length extension attack
|
3,640
|
121
|
Start
|
Unknown
|
262
|
SipHash
|
3,635
|
121
|
Start
|
Low
|
263
|
PKCS 11
|
3,620
|
120
|
Unknown
|
Unknown
|
264
|
Bomba (cryptography)
|
3,578
|
119
|
Start
|
Low
|
265
|
Avalanche effect
|
3,578
|
119
|
Start
|
High
|
266
|
Merkle–Damgård construction
|
3,546
|
118
|
C
|
Unknown
|
267
|
Directory service
|
3,538
|
117
|
Start
|
Mid
|
268
|
Timing attack
|
3,522
|
117
|
C
|
High
|
269
|
Crypto AG
|
3,510
|
117
|
C
|
High
|
270
|
Atbash
|
3,504
|
116
|
Stub
|
Low
|
271
|
Hashcash
|
3,494
|
116
|
Start
|
Unknown
|
272
|
Pre-shared key
|
3,490
|
116
|
Start
|
Mid
|
273
|
K-anonymity
|
3,472
|
115
|
Start
|
Mid
|
274
|
Ricky McCormick's encrypted notes
|
3,459
|
115
|
B
|
Unknown
|
275
|
Key exchange
|
3,440
|
114
|
Start
|
Unknown
|
276
|
Subject Alternative Name
|
3,436
|
114
|
Stub
|
Mid
|
277
|
Disk encryption
|
3,419
|
113
|
C
|
High
|
278
|
Clipper chip
|
3,409
|
113
|
C
|
High
|
279
|
Type B Cipher Machine
|
3,402
|
113
|
Start
|
Low
|
280
|
Collision attack
|
3,401
|
113
|
Start
|
High
|
281
|
Australian Signals Directorate
|
3,367
|
112
|
C
|
Low
|
282
|
Affine cipher
|
3,334
|
111
|
C
|
Low
|
283
|
Dictionary attack
|
3,328
|
110
|
C
|
Unknown
|
284
|
Polyalphabetic cipher
|
3,326
|
110
|
Start
|
Unknown
|
285
|
Data anonymization
|
3,322
|
110
|
Start
|
Mid
|
286
|
List of ciphertexts
|
3,312
|
110
|
List
|
Low
|
287
|
Digital renminbi
|
3,260
|
108
|
B
|
High
|
288
|
Special Collection Service
|
3,244
|
108
|
C
|
Low
|
289
|
Cryptographic protocol
|
3,219
|
107
|
Start
|
High
|
290
|
Hash chain
|
3,202
|
106
|
Start
|
Unknown
|
291
|
Wildcard certificate
|
3,189
|
106
|
Start
|
Unknown
|
292
|
Crypto-anarchy
|
3,183
|
106
|
Start
|
High
|
293
|
Schnorr signature
|
3,180
|
106
|
C
|
High
|
294
|
RSA Factoring Challenge
|
3,151
|
105
|
Start
|
Low
|
295
|
Quantum network
|
3,147
|
104
|
C
|
Low
|
296
|
Whonix
|
3,145
|
104
|
Start
|
Mid
|
297
|
Comparison of SSH clients
|
3,118
|
103
|
List
|
Low
|
298
|
Twofish
|
3,102
|
103
|
Start
|
High
|
299
|
Communications security
|
3,092
|
103
|
Start
|
Mid
|
300
|
Optimal asymmetric encryption padding
|
3,082
|
102
|
Start
|
High
|
301
|
Threema
|
3,082
|
102
|
C
|
Unknown
|
302
|
Filecoin
|
3,076
|
102
|
Stub
|
Low
|
303
|
BB84
|
3,039
|
101
|
Start
|
Low
|
304
|
Whitfield Diffie
|
2,990
|
99
|
B
|
High
|
305
|
Plaintext
|
2,964
|
98
|
Start
|
High
|
306
|
Disk encryption theory
|
2,947
|
98
|
C
|
Unknown
|
307
|
Non-interactive zero-knowledge proof
|
2,916
|
97
|
Start
|
Low
|
308
|
Scrambler
|
2,908
|
96
|
C
|
Unknown
|
309
|
PKCS 8
|
2,890
|
96
|
Stub
|
Unknown
|
310
|
Curve448
|
2,884
|
96
|
Start
|
Mid
|
311
|
Keygen
|
2,881
|
96
|
C
|
Low
|
312
|
Preimage attack
|
2,877
|
95
|
Stub
|
Unknown
|
313
|
Gordon Welchman
|
2,865
|
95
|
C
|
Low
|
314
|
HKDF
|
2,817
|
93
|
Start
|
Unknown
|
315
|
Magic (cryptography)
|
2,806
|
93
|
Start
|
Unknown
|
316
|
Harvest now, decrypt later
|
2,801
|
93
|
Start
|
Low
|
317
|
IEEE 802.11i-2004
|
2,792
|
93
|
C
|
Mid
|
318
|
Physical unclonable function
|
2,790
|
93
|
Start
|
Unknown
|
319
|
Data at rest
|
2,783
|
92
|
C
|
Mid
|
320
|
FIPS 140
|
2,772
|
92
|
Start
|
Mid
|
321
|
Alastair Denniston
|
2,748
|
91
|
Start
|
Unknown
|
322
|
Charlie Lee (computer scientist)
|
2,747
|
91
|
Start
|
Low
|
323
|
Secret sharing
|
2,741
|
91
|
B
|
High
|
324
|
Export of cryptography from the United States
|
2,727
|
90
|
C
|
Unknown
|
325
|
DNS-based Authentication of Named Entities
|
2,725
|
90
|
C
|
Mid
|
326
|
Dilly Knox
|
2,705
|
90
|
B
|
Unknown
|
327
|
Mumble (software)
|
2,688
|
89
|
C
|
Unknown
|
328
|
Algorand
|
2,683
|
89
|
B
|
Low
|
329
|
Certificate Transparency
|
2,632
|
87
|
C
|
High
|
330
|
DNS Certification Authority Authorization
|
2,620
|
87
|
GA
|
Low
|
331
|
I. J. Good
|
2,617
|
87
|
C
|
Low
|
332
|
Entrust
|
2,586
|
86
|
Start
|
Low
|
333
|
CCM mode
|
2,584
|
86
|
Start
|
High
|
334
|
Bouncy Castle (cryptography)
|
2,564
|
85
|
Start
|
Unknown
|
335
|
William Binney (intelligence official)
|
2,562
|
85
|
Start
|
Mid
|
336
|
Phil Zimmermann
|
2,549
|
84
|
Start
|
Mid
|
337
|
Zcash
|
2,542
|
84
|
Start
|
Low
|
338
|
Encrypting File System
|
2,536
|
84
|
B
|
Unknown
|
339
|
Rijndael MixColumns
|
2,536
|
84
|
Start
|
Low
|
340
|
Classical cipher
|
2,528
|
84
|
Start
|
Top
|
341
|
Clock drift
|
2,510
|
83
|
C
|
Low
|
342
|
Confusion and diffusion
|
2,509
|
83
|
Start
|
Mid
|
343
|
Baby-step giant-step
|
2,505
|
83
|
B
|
Unknown
|
344
|
Key management
|
2,491
|
83
|
Unknown
|
Unknown
|
345
|
HTTP Public Key Pinning
|
2,490
|
83
|
C
|
Mid
|
346
|
Reception and criticism of WhatsApp security and privacy features
|
2,489
|
82
|
C
|
Low
|
347
|
Comparison of disk encryption software
|
2,477
|
82
|
List
|
High
|
348
|
Off-the-record messaging
|
2,453
|
81
|
Start
|
Unknown
|
349
|
FIPS 140-3
|
2,450
|
81
|
C
|
Low
|
350
|
Authenticator
|
2,434
|
81
|
Start
|
Unknown
|
351
|
Martin Hellman
|
2,427
|
80
|
Start
|
High
|
352
|
Pepper (cryptography)
|
2,421
|
80
|
Start
|
Low
|
353
|
Chosen-plaintext attack
|
2,416
|
80
|
Stub
|
Unknown
|
354
|
Paillier cryptosystem
|
2,408
|
80
|
Start
|
High
|
355
|
Opportunistic TLS
|
2,386
|
79
|
Start
|
Mid
|
356
|
DES supplementary material
|
2,383
|
79
|
C
|
Low
|
357
|
Trusted Computing
|
2,378
|
79
|
C
|
Mid
|
358
|
Dm-crypt
|
2,370
|
79
|
Start
|
Low
|
359
|
Blum Blum Shub
|
2,327
|
77
|
Start
|
High
|
360
|
CBC-MAC
|
2,324
|
77
|
C
|
High
|
361
|
Comparison of cryptography libraries
|
2,322
|
77
|
List
|
Unknown
|
362
|
Trapdoor function
|
2,312
|
77
|
Start
|
High
|
363
|
Bullrun (decryption program)
|
2,295
|
76
|
B
|
Low
|
364
|
Ciphertext indistinguishability
|
2,279
|
75
|
C
|
High
|
365
|
Tox (protocol)
|
2,266
|
75
|
C
|
Low
|
366
|
McEliece cryptosystem
|
2,265
|
75
|
C
|
High
|
367
|
ElGamal signature scheme
|
2,241
|
74
|
Start
|
Top
|
368
|
Security level
|
2,239
|
74
|
Stub
|
Mid
|
369
|
Double Ratchet Algorithm
|
2,236
|
74
|
Start
|
Low
|
370
|
Ralph Merkle
|
2,233
|
74
|
C
|
High
|
371
|
Trusted timestamping
|
2,228
|
74
|
Start
|
Unknown
|
372
|
Meet-in-the-middle attack
|
2,216
|
73
|
C
|
High
|
373
|
SegWit
|
2,204
|
73
|
Start
|
Low
|
374
|
Advanced Encryption Standard process
|
2,200
|
73
|
C
|
Mid
|
375
|
Crypto Wars
|
2,199
|
73
|
Start
|
High
|
376
|
Leo Marks
|
2,196
|
73
|
B
|
Unknown
|
377
|
Anonymous P2P
|
2,196
|
73
|
C
|
Low
|
378
|
Poly1305
|
2,186
|
72
|
Start
|
Top
|
379
|
Key disclosure law
|
2,159
|
71
|
C
|
Low
|
380
|
Encryption software
|
2,153
|
71
|
Start
|
Top
|
381
|
Crypt (C)
|
2,113
|
70
|
C
|
High
|
382
|
Comparison of cryptographic hash functions
|
2,103
|
70
|
List
|
Low
|
383
|
Lenstra elliptic-curve factorization
|
2,102
|
70
|
C
|
Low
|
384
|
Comparison of TLS implementations
|
2,081
|
69
|
List
|
High
|
385
|
Coppersmith's attack
|
2,081
|
69
|
B
|
High
|
386
|
AES implementations
|
2,077
|
69
|
List
|
Low
|
387
|
Cryptographic primitive
|
2,049
|
68
|
Start
|
Top
|
388
|
Tiny Encryption Algorithm
|
2,046
|
68
|
Unknown
|
Unknown
|
389
|
William F. Friedman
|
2,040
|
68
|
C
|
Unknown
|
390
|
LibreSSL
|
2,040
|
68
|
Start
|
High
|
391
|
Autokey cipher
|
2,020
|
67
|
C
|
Mid
|
392
|
Nothing-up-my-sleeve number
|
2,020
|
67
|
C
|
Low
|
393
|
MD4
|
2,006
|
66
|
Start
|
Low
|
394
|
Serpent (cipher)
|
2,003
|
66
|
C
|
Low
|
395
|
Enigma rotor details
|
2,000
|
66
|
Start
|
Mid
|
396
|
FileVault
|
1,996
|
66
|
C
|
Mid
|
397
|
Key encapsulation mechanism
|
1,996
|
66
|
Start
|
High
|
398
|
One-key MAC
|
1,956
|
65
|
Start
|
Low
|
399
|
Wiener's attack
|
1,956
|
65
|
B
|
High
|
400
|
Cryptanalysis of the Lorenz cipher
|
1,927
|
64
|
C
|
High
|
401
|
Proof of authority
|
1,919
|
63
|
Start
|
Low
|
402
|
DeCSS
|
1,918
|
63
|
C
|
Mid
|
403
|
NTRUEncrypt
|
1,916
|
63
|
C
|
Mid
|
404
|
Orbot
|
1,880
|
62
|
Stub
|
Low
|
405
|
Blind signature
|
1,877
|
62
|
C
|
Mid
|
406
|
NSAKEY
|
1,874
|
62
|
C
|
High
|
407
|
Tor2web
|
1,849
|
61
|
Start
|
Low
|
408
|
Differential cryptanalysis
|
1,842
|
61
|
B
|
High
|
409
|
Generic Security Services Application Program Interface
|
1,842
|
61
|
Start
|
Low
|
410
|
International Data Encryption Algorithm
|
1,830
|
61
|
C
|
Unknown
|
411
|
Jami (software)
|
1,830
|
61
|
Start
|
Unknown
|
412
|
Arthur Scherbius
|
1,821
|
60
|
Start
|
Mid
|
413
|
SYN cookies
|
1,821
|
60
|
Start
|
Unknown
|
414
|
GNUnet
|
1,817
|
60
|
B
|
Low
|
415
|
CableCARD
|
1,816
|
60
|
B
|
Unknown
|
416
|
ADFGVX cipher
|
1,815
|
60
|
Unknown
|
Unknown
|
417
|
Key stretching
|
1,808
|
60
|
Start
|
Unknown
|
418
|
Garlic routing
|
1,806
|
60
|
Stub
|
Unknown
|
419
|
Downgrade attack
|
1,806
|
60
|
Start
|
Mid
|
420
|
RSA problem
|
1,803
|
60
|
Start
|
Top
|
421
|
W. T. Tutte
|
1,796
|
59
|
C
|
Mid
|
422
|
Simultaneous Authentication of Equals
|
1,796
|
59
|
Start
|
High
|
423
|
Strong cryptography
|
1,794
|
59
|
Unknown
|
Unknown
|
424
|
Hybrid cryptosystem
|
1,793
|
59
|
Start
|
High
|
425
|
BLS digital signature
|
1,790
|
59
|
Start
|
Mid
|
426
|
Roger Dingledine
|
1,787
|
59
|
Start
|
Unknown
|
427
|
NTRU
|
1,776
|
59
|
C
|
Low
|
428
|
Advanced Access Content System
|
1,754
|
58
|
C
|
Mid
|
429
|
ZeroNet
|
1,737
|
57
|
Start
|
Low
|
430
|
Temporal Key Integrity Protocol
|
1,733
|
57
|
C
|
Low
|
431
|
A5/1
|
1,730
|
57
|
B
|
High
|
432
|
Friend-to-friend
|
1,730
|
57
|
Start
|
Low
|
433
|
Black Chamber
|
1,725
|
57
|
Unknown
|
Unknown
|
434
|
Always-on DRM
|
1,725
|
57
|
Start
|
Low
|
435
|
Bernstein v. United States
|
1,716
|
57
|
Start
|
Mid
|
436
|
Red/black concept
|
1,713
|
57
|
Stub
|
Unknown
|
437
|
Banburismus
|
1,708
|
56
|
C
|
Low
|
438
|
UltraViolet (website)
|
1,700
|
56
|
C
|
Low
|
439
|
Format-preserving encryption
|
1,698
|
56
|
Start
|
High
|
440
|
Visual cryptography
|
1,697
|
56
|
Unknown
|
Unknown
|
441
|
Null cipher
|
1,696
|
56
|
Stub
|
Low
|
442
|
Government Communications Security Bureau
|
1,693
|
56
|
B
|
Low
|
443
|
Key server (cryptographic)
|
1,690
|
56
|
Start
|
Mid
|
444
|
Briar (software)
|
1,684
|
56
|
Start
|
Low
|
445
|
FreeOTP
|
1,679
|
55
|
Start
|
Low
|
446
|
Secret decoder ring
|
1,678
|
55
|
Start
|
Low
|
447
|
Collision resistance
|
1,678
|
55
|
Start
|
High
|
448
|
Challenge-Handshake Authentication Protocol
|
1,671
|
55
|
Start
|
Low
|
449
|
Power analysis
|
1,662
|
55
|
Unknown
|
Unknown
|
450
|
Information-theoretic security
|
1,655
|
55
|
Start
|
Top
|
451
|
Integrated Encryption Scheme
|
1,650
|
55
|
Start
|
Low
|
452
|
Chosen-ciphertext attack
|
1,648
|
54
|
Start
|
High
|
453
|
Bitcoin Gold
|
1,646
|
54
|
Start
|
Low
|
454
|
Public key fingerprint
|
1,642
|
54
|
Start
|
Mid
|
455
|
Word square
|
1,640
|
54
|
C
|
Low
|
456
|
Needham–Schroeder protocol
|
1,636
|
54
|
Start
|
Mid
|
457
|
Coinye
|
1,630
|
54
|
Start
|
Low
|
458
|
Oblivious transfer
|
1,626
|
54
|
Start
|
Unknown
|
459
|
Keybase
|
1,625
|
54
|
Start
|
Low
|
460
|
Rotor machine
|
1,621
|
54
|
Unknown
|
Unknown
|
461
|
Shugborough inscription
|
1,616
|
53
|
Start
|
Low
|
462
|
Berlekamp–Massey algorithm
|
1,614
|
53
|
Start
|
Unknown
|
463
|
Open Whisper Systems
|
1,598
|
53
|
B
|
Unknown
|
464
|
Taher Elgamal
|
1,596
|
53
|
C
|
Unknown
|
465
|
Codebook
|
1,593
|
53
|
Stub
|
Unknown
|
466
|
Interactive proof system
|
1,590
|
53
|
Start
|
High
|
467
|
Hidden message
|
1,586
|
52
|
Start
|
Low
|
468
|
David Wheeler (computer scientist)
|
1,585
|
52
|
Start
|
Low
|
469
|
RIPEMD
|
1,559
|
51
|
C
|
Unknown
|
470
|
SecureDrop
|
1,554
|
51
|
Start
|
Mid
|
471
|
Supersingular isogeny key exchange
|
1,551
|
51
|
Start
|
Low
|
472
|
Cryptovirology
|
1,526
|
50
|
Start
|
Mid
|
473
|
Tabula recta
|
1,521
|
50
|
Unknown
|
Unknown
|
474
|
Key-agreement protocol
|
1,502
|
50
|
Start
|
Top
|
475
|
National Cryptologic Museum
|
1,499
|
49
|
C
|
Mid
|
476
|
Random oracle
|
1,487
|
49
|
Start
|
Low
|
477
|
Content Authenticity Initiative
|
1,470
|
49
|
C
|
Low
|
478
|
Hash-based cryptography
|
1,450
|
48
|
Start
|
Low
|
479
|
Twisted Edwards curve
|
1,447
|
48
|
C
|
Low
|
480
|
SIGSALY
|
1,443
|
48
|
C
|
Low
|
481
|
Michael O. Rabin
|
1,441
|
48
|
C
|
Low
|
482
|
Dorabella Cipher
|
1,439
|
47
|
Unknown
|
Unknown
|
483
|
Secure cryptoprocessor
|
1,436
|
47
|
C
|
Mid
|
484
|
Retroshare
|
1,431
|
47
|
C
|
Low
|
485
|
GOST (block cipher)
|
1,427
|
47
|
Start
|
Mid
|
486
|
Mix network
|
1,426
|
47
|
Stub
|
Unknown
|
487
|
Four-square cipher
|
1,423
|
47
|
C
|
Unknown
|
488
|
SIGABA
|
1,420
|
47
|
C
|
High
|
489
|
Perfect Dark (P2P)
|
1,412
|
47
|
C
|
Low
|
490
|
Ring signature
|
1,407
|
46
|
Start
|
Mid
|
491
|
Code (cryptography)
|
1,406
|
46
|
Start
|
Top
|
492
|
Two-square cipher
|
1,404
|
46
|
Unknown
|
Unknown
|
493
|
Kasiski examination
|
1,401
|
46
|
Unknown
|
Unknown
|
494
|
Fuzzy hashing
|
1,401
|
46
|
C
|
Low
|
495
|
Whirlpool (hash function)
|
1,390
|
46
|
Start
|
Low
|
496
|
Identity-based encryption
|
1,389
|
46
|
C
|
High
|
497
|
Content Scramble System
|
1,389
|
46
|
Start
|
Mid
|
498
|
MS-CHAP
|
1,388
|
46
|
Start
|
Low
|
499
|
Frank Terpil
|
1,381
|
46
|
Start
|
Low
|
500
|
Pseudorandom function family
|
1,380
|
46
|
Start
|
Low
|