2472:
2429:
1736:
160-bit digest, an FIPS standard; the first released version was defective and replaced by this; NIST/NSA have released several variants with longer 'digest' lengths;
1825:
1373:
449:
2115:
2190:
2222:(GCHQ) – internal evaluation/selections, a division is charged with developing and recommending cryptographic standards for the UK government
2175:
to produce standards in many areas to guide operations of the US Federal government; many FIPS publications are ongoing and related to cryptography
1262:
510:
2184:
972:
863:
1301:
1438:
2698:
2667:
2457:
1352:
625:
258:
2642:
1328:
2315:– an e-learning freeware programme in English and German— exhaustive educational tool about cryptography and cryptanalysis
2662:
2657:
2487:
1443:
1410:
1284:
2590:
1383:
1011:
2652:
2498:
2168:
1696:
881:
873:
2637:
2446:
2219:
1821:
1659:
444:
17:
2622:
2617:
2238:
2178:
1924:
2632:
2627:
2610:
1625:
2181:(ANSI) – standardization process that produces many standards in many areas; some are cryptography related, ongoing)
2647:
2373:
1196:
1153:
2309:– evaluation/recommendation program sponsored by the Japanese government; draft recommendations published 2003
2193:(IEEE) – standardization process produces many standards in many areas; some are cryptography related, ongoing
2399:
2187:(ISO) – standardization process produces many standards in many areas; some are cryptography related, ongoing
1878:
407:– complex hand cypher used by at least one Soviet spy in the early 1950s; it proved quite secure for the time
204:
2335:
2196:
2072:
1712:
1529:
651:
2216:(NSA) – internal evaluation/selections, charged with assisting NIST in its cryptographic responsibilities
1791:
356:
30:
2688:
174:
149:
2583:
2528:
2268:
1534:
1524:
1141:
1127:
671:
2599:
2523:
2225:
2082:
1654:
1647:
1322:
341:
2346:
1919:
2404:
2102:
2048:
1939:
1485:
1394:
1149:
268:
221:
216:
2251:
2213:
2097:
2028:
1981:
1556:
1277:
976:
827:
800:
363:
263:
252:
68:
1220:– WWII German rotor cypher machine—many variants, any user networks for most of the variants
2576:
2146:
2043:
1986:
1610:
473:
417:
248:
2385:
2355:
2324:
1996:
1991:
1929:
1512:
1502:
1455:
1226:– highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain
2482:
2476:
2131:
2105: – Cryptographic principle that states everything except the key can be public knowledge
1849:
1843:
1831:
1561:
1519:
1507:
1450:
1389:
897:
584:
394:
2511:
2451:
2200:
1934:
1883:
1699:– (Two-Track-MAC) NESSIE selection MAC; K.U.Leuven (Belgium) & debis AG (Germany)
1691:
382:
283:
273:
226:
763:) – 128-bit block; the successor to CAST-128 and a candidate for the AES competition
8:
2377:
2351:
2003:
1944:
1888:
1635:
1566:
465:
460:
302:
236:
76:
862:– project name FOX, 64-bit and 128-bit block family; Mediacrypt (Switzerland); by
2151:
1949:
1908:
1873:
1605:
1595:
1551:
1478:
1472:
1432:
891:
833:
521:
399:
179:
346:
2693:
2434:
2092:
2077:
2062:
1913:
1615:
1600:
1576:
724:
712:
164:
154:
144:
102:
2136:
2018:
1903:
1856:
selection hash function, Scopus
Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium)
1835:
1233:
1217:
1170:
1090:
1086:
956:
939:
923:
750:
707:
486:
194:
60:
2415:
2362:
2087:
1969:
1795:
1581:
1404:
1133:
1017:
991:
778:
768:
697:
557:
368:
932:– Russian 128-bit block cipher, defined in GOST R 34.12-2015 and RFC 7801.
2282:
2262:
2008:
1683:
1571:
1306:
1184:
1166:
1119:
918:
908:
867:
746:
716:
683:
662:
657:
515:
503:
477:
423:
351:
334:
278:
199:
159:
36:
2682:
2296:
2121:
2067:
2033:
2013:
1861:
1640:
1265:– superencrypted code used by the Royal Navy in the 1930s and into WWII
1237:
1200:
1157:
987:
935:
849:
788:
703:
666:
644:
637:
610:
491:
482:
454:
329:
324:
312:
231:
189:
169:
132:
88:
2394:
2199:(IETF) – standardization process that produces many standards called
1976:
1954:
1687:
1098:
877:
839:
580:
562:
551:
495:
184:
127:
43:
2454:– United Kingdom, India, Ireland, Malaysia, and formerly New Zealand
1173:
design team—not all triple uses of DES increase security, Tuchman's does;
2492:
2421:
2340:
1539:
1399:
1294:
1223:
1209:
679:
576:
373:
64:
56:
52:
2390:
2141:
2126:
1959:
1811:
1723:
1630:
1162:
1063:
1051:
1035:
929:
469:
404:
112:
97:
93:
2473:
List of important publications in computer science § Cryptography
2568:
2439:
1094:
794:
630:
554:– Vernam and Mauborgne, patented 1919; an extreme stream cypher
541:
117:
2548:
938:– block cypher built from stream cypher and hash function, by
2312:
2306:
1815:
1801:
1779:
1765:
1751:
1737:
1620:
1588:
1424:
1420:
1365:
1336:
1316:
1310:
1174:
1137:
1123:
1109:
1103:
1080:
1005:
859:
853:
843:
782:
772:
756:
738:
732:
691:
602:
570:
545:
535:
526:
72:
1814:– developed in Europe for the RIPE project, 160-bit digest;
2410:
2288:
2281:
Project – an evaluation/selection program sponsored by the
2233:
1771:
1757:
1743:
1709:
selection MAC; Intel, UNevada Reno, IBM, Technion, & UC Davis
1665:
1495:
1180:
1023:
981:
596:
592:
389:
39:
is provided as an overview of and topical guide to cryptography:
2300:
2292:
2278:
2229:
1853:
1775:
1761:
1747:
1706:
1679:
1669:
1414:
1332:
1288:
1229:
1113:
1076:
1001:
997:
950:
914:
905:
901:
791:– cipher used in US cellphones, found to have weaknesses.
728:
687:
107:
1259:– WWII Japanese Navy superencyphered code; many variants
2501:– cryptography from the viewpoint of information theory
2368:
1787:
1729:
1722:– one of a series of message digest algorithms by Prof
1490:
1417:
selection asymmetric encryption scheme; ISO/IEC 18033-2 draft
1378:
1342:
1256:
1245:
1205:
1070:
812:
760:
742:
620:
565:(ARCFOUR) – one of a series by Professor Ron Rivest of
317:
2109:
1291:
selection asymmetric encryption scheme; IBM Zurich
Research
1177:
recommendation (limited), only when used as in FIPS Pub 46-3
2272:
2261:
RIPE – division of the RACE project sponsored by the
2255:
2172:
1808:
hash function defined in obsolete standard GOST R 34.11-94.
1805:
1702:
1675:
1357:
1192:
1029:
944:
823:
818:
806:
675:
615:
531:
434:
430:
122:
1790:– originally known as Keccak; was the winner of the
1339:
recommendation only in DEM construction w/SEC1 parameters
2466:
1804:– Russian algorithm created to replace an obsolete
1733:
1719:
1460:
1059:
1047:
1041:
968:
964:
885:
745:) – 64-bit block; one of a series of algorithms by
706:– built from a stream cypher and hash function, by
566:
438:
2495:– quarterly journal focusing on historical aspects
2203:) in many areas; some are cryptography related, ongoing)
2157:
753:, insistent that the name is not due to their initials
2376:- Arms Export Control Act investigation regarding the
2271:(AES) – a "break-off" competition sponsored by
1778:
selection hash function, FIPS 180-2, 512-bit digest;
1764:
selection hash function, FIPS 180-2, 384-bit digest;
1750:
selection hash function, FIPS 180-2, 256-bit digest;
1335:
selection asymmetric encryption scheme; NTT (Japan);
1004:
selection 64-bit block; Mitsubishi
Electric (Japan);
55:. Modern cryptography intersects the disciplines of
1271:
138:
1014:– 128-bit block: Mitsubishi Electric (Japan)
815:– a variant of DES to increase the key size.
411:
2191:Institute of Electrical and Electronics Engineers
678:selection for the AES, FIPS 197; Created 2001—by
2680:
1050:– variable block length; AES finalist, by
1646:
2185:International Organization for Standardization
917:– 64-bit block designed by Barretto and
2584:
2319:
1214:Polyalphabetic substitution machine cyphers
2458:Regulation of Investigatory Powers Act 2000
1824:– one of Retter series; developed by
1362:Elliptic Curve Diffie-Hellman key agreement
1347:Elliptic Curve Integrated Encryption System
1276:
953:– 128-bit block cipher, AES candidate
803:(DES) – 64-bit block; FIPS 46-3, 1976
731:selection (NTT & Mitsubishi Electric);
259:Japanese cryptology from the 1500s to Meiji
210:
2591:
2577:
2241:(CSE) – Canadian intelligence agency
2171:(FIPS) Publication Program – run by
1044:– 64-bit block, variable key length
1032:– variable block length (64-256-bit)
242:
82:
2488:Encyclopedia of Cryptography and Security
2295:; motivated by the failure of all of the
2162:
2116:Undeciphered historical codes and ciphers
2110:Undeciphered historical codes and ciphers
870:of Swiss Institute of Technology Lausanne
809:– an AES candidate derived from DES
2354:'s challenge to the restrictions on the
2207:
2169:Federal Information Processing Standards
2056:
2499:Communication Theory of Secrecy Systems
1183:– 128-bit block; AES finalist by
1089:– 128-bit block; AES finalist by
874:International Data Encryption Algorithm
830:variant designed to speed up encryption
494:– WWII mechanical onetime pad by
468:– WWII mechanical onetime pad by
67:. Applications of cryptography include
51:) – practice and study of hiding
14:
2681:
2598:
2467:Academic and professional publications
2447:Cryptography laws in different nations
2220:Government Communications Headquarters
1846:– NIST hash function competition
1660:Keyed-hash message authentication code
2572:
2239:Communications Security Establishment
2179:American National Standards Institute
1925:Impossible differential cryptanalysis
1545:
1477:
2158:Organizations and selection projects
1626:Password-authenticated key agreement
1384:Merkle–Hellman knapsack cryptosystem
1325:– (discrete logarithm variant)
573:recommended limited to 128-bit key
24:
2699:Cryptography lists and comparisons
2505:
1232:– WWII US cypher machine by
674:(Rijndael) – 128-bit block;
437:– ciphers specified for the
25:
2710:
2549:"Research Paper - factorable.net"
422:
2430:Cryptography and law enforcement
2400:Digital Millennium Copyright Act
1860:
1272:Modern asymmetric-key algorithms
1253:Hybrid code/cypher combinations
643:
381:
205:Indistinguishability obfuscation
139:Uses of cryptographic techniques
2668:Technology and applied sciences
2336:AACS encryption key controversy
2329:
2245:
2197:Internet Engineering Task Force
2073:Ciphertext indistinguishability
1713:Oblivious Pseudorandom Function
1530:Secure key issuing cryptography
900:– 64-bit block; based on
652:Block cipher modes of operation
485:– improvement on FISH by
412:Modern symmetric-key algorithms
301:
2541:
1867:
1792:NIST hash function competition
1248:– WWII UK cypher machine
1112:– 256-bit block cypher;
904:, adopted for next generation
357:Homophonic substitution cipher
31:Index of cryptography articles
13:
1:
2643:Natural and physical sciences
2534:
2258:selection process, ended 1976
1073:– variable block length
175:Dining cryptographers problem
150:Secure multiparty computation
2529:Outline of computer security
2269:Advanced Encryption Standard
1648:Cryptographic hash functions
1587:
1535:Certificateless cryptography
1525:Certificate-based encryption
947:– 64-bit block ciphers
926:– 64-bit block ciphers
876:(IDEA) – 64-bit block;
672:Advanced Encryption Standard
583:variant with 10 byte random
309:Monoalphabetic substitution
296:
7:
2663:Society and social sciences
2658:Religion and belief systems
2524:Outline of computer science
2517:
2226:Defence Signals Directorate
1655:Message authentication code
1323:Elliptic curve cryptography
967:, early 1970s; modified by
441:cellular telephone standard
342:Polyalphabetic substitution
10:
2715:
2470:
2347:Bernstein v. United States
2320:Influential cryptographers
2291:– program funded by
2113:
1920:Differential cryptanalysis
1470:
1319:– discrete logarithm
1116:selection Gemplus (France)
649:
605:– A Salsa20 variant.
518:– intended as a PRNG
415:
291:
246:
28:
2606:
2418:– now public domain
2405:Digital rights management
2228:(DSD) – Australian
2049:Rubber-hose cryptanalysis
1940:Meet-in-the-middle attack
1894:
1740:recommendation (limited)
1486:Public key infrastructure
1395:Niederreiter cryptosystem
990:– AES finalist, by
715:– 64-bit block; by
269:World War II cryptography
222:Post-quantum cryptography
217:Multivariate cryptography
2424:– and digital cash
2252:Data Encryption Standard
2214:National Security Agency
2029:Man-in-the-middle attack
1818:recommendation (limited)
1557:Man-in-the-middle attack
1278:Asymmetric key algorithm
1208:– 96-bit block by
1008:recommendation (limited)
856:recommendation (limited)
801:Data Encryption Standard
785:recommendation (limited)
364:Polygraphic substitution
264:World War I cryptography
253:Timeline of cryptography
211:Branches of cryptography
2653:Philosophy and thinking
2358:from the United States.
2147:Shugborough inscription
2044:Black-bag cryptanalysis
1611:Key derivation function
1466:
1386:– knapsack scheme
1309:– key agreement;
1130:, by Daemen and Rijmen
1122:– grandfather of
1079:– 128-bit block;
842:– 128-bit block;
771:– 128-bit block;
727:– 128-bit block;
418:Symmetric-key algorithm
249:History of cryptography
243:History of cryptography
83:Essence of cryptography
2460:– United Kingdom
2386:Export of cryptography
2356:export of cryptography
2325:List of cryptographers
2163:Cryptography standards
2103:Kerckhoffs's principle
1930:Integral cryptanalysis
1726:of MIT; 128-bit digest
1513:Certificate revocation
1503:Public key certificate
1456:Threshold cryptosystem
1349:, Certicom Corporation
1144:, by Daemen and Rijmen
852:– 64-bit block;
781:– 64-bit block;
18:Topics in cryptography
2638:Mathematics and logic
2483:Journal of Cryptology
2477:Books on cryptography
2471:Further information:
2435:Telephone wiretapping
2208:General cryptographic
2057:Robustness properties
1900:Symmetric algorithms
1732:– developed at
1520:ID-based cryptography
1508:Certificate authority
1451:Paillier cryptosystem
1390:McEliece cryptosystem
1106:– 160-bit block
1038:– 128-bit block
1026:– 128-bit block
984:– AES candidate
836:– 128-bit block
700:– 128-bit block
650:Further information:
457:– by Siemens AG
2689:Outlines of sciences
2623:Geography and places
2618:Culture and the arts
2512:Security engineering
2452:Official Secrets Act
2004:Side channel attacks
1935:Linear cryptanalysis
1884:Index of coincidence
1020:– 64-bit block
797:– 64-bit block
274:Reservehandverfahren
227:Quantum cryptography
2352:Daniel J. Bernstein
2068:Random oracle model
1945:Mod-n cryptanalysis
1889:Kasiski examination
1826:Maciej A. Czyzewski
1567:Offline private key
959:– by Tuchman
665:– pattern by
599:recommended cipher
587:, easy to implement
466:Geheimfernschreiber
461:WWII 'Fish' cyphers
237:Visual cryptography
77:electronic commerce
2633:History and events
2628:Health and fitness
2600:Knowledge outlines
2152:Voynich manuscript
2132:D'Agapeyeff cipher
1950:Related-key attack
1909:Brute force attack
1874:Frequency analysis
1606:Related key attack
1596:Brute force attack
1546:Transport/exchange
1479:Key authentication
1473:Key (cryptography)
1435:– factoring
1433:Rabin cryptosystem
1407:– factoring
1136:– father of
892:Iraqi Block Cipher
400:Permutation cipher
180:Anonymous remailer
165:Digital signatures
145:Commitment schemes
73:computer passwords
2676:
2675:
2611:General reference
2265:, ended mid-1980s
2093:Forward anonymity
2078:Semantic security
2063:Provable security
2040:External attacks
1982:Chosen-ciphertext
1616:Key strengthening
1601:Dictionary attack
1577:Trusted paper key
1562:Needham–Schroeder
155:Electronic voting
103:Cryptographic key
16:(Redirected from
2706:
2593:
2586:
2579:
2570:
2569:
2563:
2562:
2560:
2559:
2545:
2232:agency, part of
2137:Dorabella cipher
2025:Network attacks
2019:Cold boot attack
1987:Chosen-plaintext
1966:Hash functions:
1904:Boomerang attack
1879:Contact analysis
1828:; 160-bit digest
1234:William Friedman
1169:, leader of the
975:and released as
924:Khufu and Khafre
751:Stafford Tavares
195:Digital currency
61:computer science
21:
2714:
2713:
2709:
2708:
2707:
2705:
2704:
2703:
2679:
2678:
2677:
2672:
2648:People and self
2602:
2597:
2567:
2566:
2557:
2555:
2547:
2546:
2542:
2537:
2520:
2508:
2506:Allied sciences
2479:
2469:
2374:Phil Zimmermann
2363:Junger v. Daley
2332:
2322:
2303:, ended in 2008
2285:, ended in 2002
2275:, ended in 2001
2248:
2210:
2165:
2160:
2118:
2114:Main category:
2112:
2088:Forward secrecy
2059:
1997:Known-plaintext
1992:Ciphertext-only
1970:Birthday attack
1897:
1870:
1865:
1796:sponge function
1682:selection MAC;
1668:(EMAC) –
1651:
1592:
1582:Wide Mouth Frog
1548:
1482:
1475:
1469:
1281:
1274:
992:Don Coppersmith
779:CIPHERUNICORN-E
769:CIPHERUNICORN-A
694:recommendation.
654:
648:
492:Schlusselzusatz
427:
420:
414:
386:
369:Playfair cipher
347:Vigenère cipher
306:
299:
294:
255:
247:Main articles:
245:
213:
141:
85:
33:
23:
22:
15:
12:
11:
5:
2712:
2702:
2701:
2696:
2691:
2674:
2673:
2671:
2670:
2665:
2660:
2655:
2650:
2645:
2640:
2635:
2630:
2625:
2620:
2614:
2613:
2607:
2604:
2603:
2596:
2595:
2588:
2581:
2573:
2565:
2564:
2553:factorable.net
2539:
2538:
2536:
2533:
2532:
2531:
2526:
2519:
2516:
2515:
2514:
2507:
2504:
2503:
2502:
2496:
2490:
2485:
2468:
2465:
2464:
2463:
2462:
2461:
2455:
2444:
2443:
2442:
2437:
2427:
2426:
2425:
2419:
2408:
2402:
2397:
2388:
2383:
2382:
2381:
2371:
2366:
2359:
2338:
2331:
2328:
2321:
2318:
2317:
2316:
2310:
2304:
2297:stream ciphers
2286:
2283:European Union
2276:
2266:
2263:European Union
2259:
2254:(DES) –
2247:
2244:
2243:
2242:
2236:
2223:
2217:
2209:
2206:
2205:
2204:
2194:
2188:
2182:
2176:
2164:
2161:
2159:
2156:
2155:
2154:
2149:
2144:
2139:
2134:
2129:
2124:
2111:
2108:
2107:
2106:
2100:
2095:
2090:
2085:
2080:
2075:
2070:
2065:
2058:
2055:
2054:
2053:
2052:
2051:
2046:
2038:
2037:
2036:
2031:
2023:
2022:
2021:
2016:
2011:
2009:Power analysis
2001:
2000:
1999:
1994:
1989:
1984:
1974:
1973:
1972:
1964:
1963:
1962:
1957:
1952:
1947:
1942:
1937:
1932:
1927:
1922:
1917:
1914:Davies' attack
1911:
1906:
1896:
1893:
1892:
1891:
1886:
1881:
1876:
1869:
1866:
1864:
1859:
1858:
1857:
1847:
1841:
1829:
1819:
1809:
1799:
1785:
1784:
1783:
1782:recommendation
1769:
1768:recommendation
1755:
1754:recommendation
1727:
1717:
1716:
1715:
1710:
1700:
1694:
1684:ISO/IEC 9797-1
1673:
1657:
1650:
1645:
1644:
1643:
1638:
1633:
1628:
1623:
1618:
1613:
1608:
1603:
1598:
1591:
1586:
1585:
1584:
1579:
1574:
1569:
1564:
1559:
1554:
1552:Diffie–Hellman
1547:
1544:
1543:
1542:
1537:
1532:
1527:
1522:
1517:
1516:
1515:
1510:
1500:
1499:
1498:
1493:
1481:
1476:
1471:Main article:
1468:
1465:
1464:
1463:
1458:
1453:
1448:
1447:
1446:
1441:
1430:
1429:
1428:
1427:recommendation
1418:
1402:
1397:
1392:
1387:
1381:
1376:
1371:
1370:
1369:
1368:recommendation
1355:
1350:
1326:
1320:
1314:
1313:recommendation
1307:Diffie-Hellman
1304:
1299:
1298:
1297:
1280:
1275:
1273:
1270:
1269:
1268:
1267:
1266:
1263:Naval Cypher 3
1260:
1251:
1250:
1249:
1243:
1227:
1221:
1212:
1203:
1190:
1185:Bruce Schneier
1178:
1167:Walter Tuchman
1160:
1147:
1146:
1145:
1117:
1107:
1101:
1084:
1083:recommendation
1074:
1068:
1067:
1066:
1057:
1039:
1033:
1027:
1021:
1015:
1009:
995:
985:
979:
954:
948:
942:
933:
927:
921:
912:
909:cellular phone
895:
889:
871:
868:Serge Vaudenay
857:
847:
846:recommendation
837:
831:
821:
816:
810:
804:
798:
792:
786:
776:
775:recommendation
766:
765:
764:
747:Carlisle Adams
736:
735:recommendation
722:
717:Bruce Schneier
710:
701:
695:
684:Vincent Rijmen
669:
663:Feistel cipher
660:
658:Product cipher
647:
642:
641:
640:
635:
634:
633:
628:
618:
613:
608:
607:
606:
590:
589:
588:
560:
555:
549:
548:recommendation
539:
538:recommendation
529:
524:
519:
513:
508:
507:
506:
504:Bletchley Park
489:
480:
478:Bletchley Park
458:
452:
447:
442:
426:
424:Stream ciphers
421:
416:Main article:
413:
410:
409:
408:
402:
397:
392:
385:
380:
379:
378:
377:
376:
371:
361:
360:
359:
354:
352:Autokey cipher
349:
339:
338:
337:
335:Keyword cipher
332:
327:
322:
321:
320:
305:
300:
298:
295:
293:
290:
289:
288:
287:
286:
281:
279:Venona project
276:
266:
261:
244:
241:
240:
239:
234:
229:
224:
219:
212:
209:
208:
207:
202:
200:Secret sharing
197:
192:
187:
182:
177:
172:
170:Crypto systems
167:
162:
160:Authentication
157:
152:
147:
140:
137:
136:
135:
130:
125:
120:
115:
110:
105:
100:
91:
84:
81:
35:The following
9:
6:
4:
3:
2:
2711:
2700:
2697:
2695:
2692:
2690:
2687:
2686:
2684:
2669:
2666:
2664:
2661:
2659:
2656:
2654:
2651:
2649:
2646:
2644:
2641:
2639:
2636:
2634:
2631:
2629:
2626:
2624:
2621:
2619:
2616:
2615:
2612:
2609:
2608:
2605:
2601:
2594:
2589:
2587:
2582:
2580:
2575:
2574:
2571:
2554:
2550:
2544:
2540:
2530:
2527:
2525:
2522:
2521:
2513:
2510:
2509:
2500:
2497:
2494:
2491:
2489:
2486:
2484:
2481:
2480:
2478:
2474:
2459:
2456:
2453:
2450:
2449:
2448:
2445:
2441:
2438:
2436:
2433:
2432:
2431:
2428:
2423:
2420:
2417:
2414:
2413:
2412:
2409:
2406:
2403:
2401:
2398:
2396:
2392:
2389:
2387:
2384:
2379:
2375:
2372:
2370:
2367:
2365:
2364:
2360:
2357:
2353:
2349:
2348:
2344:
2343:
2342:
2339:
2337:
2334:
2333:
2327:
2326:
2314:
2311:
2308:
2305:
2302:
2299:submitted to
2298:
2294:
2290:
2287:
2284:
2280:
2277:
2274:
2270:
2267:
2264:
2260:
2257:
2253:
2250:
2249:
2240:
2237:
2235:
2231:
2227:
2224:
2221:
2218:
2215:
2212:
2211:
2202:
2198:
2195:
2192:
2189:
2186:
2183:
2180:
2177:
2174:
2170:
2167:
2166:
2153:
2150:
2148:
2145:
2143:
2140:
2138:
2135:
2133:
2130:
2128:
2125:
2123:
2122:Beale ciphers
2120:
2119:
2117:
2104:
2101:
2099:
2096:
2094:
2091:
2089:
2086:
2084:
2081:
2079:
2076:
2074:
2071:
2069:
2066:
2064:
2061:
2060:
2050:
2047:
2045:
2042:
2041:
2039:
2035:
2034:Replay attack
2032:
2030:
2027:
2026:
2024:
2020:
2017:
2015:
2014:Timing attack
2012:
2010:
2007:
2006:
2005:
2002:
1998:
1995:
1993:
1990:
1988:
1985:
1983:
1980:
1979:
1978:
1977:Attack models
1975:
1971:
1968:
1967:
1965:
1961:
1958:
1956:
1953:
1951:
1948:
1946:
1943:
1941:
1938:
1936:
1933:
1931:
1928:
1926:
1923:
1921:
1918:
1915:
1912:
1910:
1907:
1905:
1902:
1901:
1899:
1898:
1890:
1887:
1885:
1882:
1880:
1877:
1875:
1872:
1871:
1863:
1862:Cryptanalysis
1855:
1851:
1848:
1845:
1842:
1840:
1837:
1836:Ross Anderson
1833:
1830:
1827:
1823:
1820:
1817:
1813:
1810:
1807:
1803:
1800:
1797:
1793:
1789:
1786:
1781:
1777:
1773:
1770:
1767:
1763:
1759:
1756:
1753:
1749:
1745:
1742:
1741:
1739:
1735:
1731:
1728:
1725:
1721:
1718:
1714:
1711:
1708:
1704:
1701:
1698:
1695:
1693:
1689:
1685:
1681:
1677:
1674:
1672:selection MAC
1671:
1667:
1663:
1662:
1661:
1658:
1656:
1653:
1652:
1649:
1642:
1641:Factorization
1639:
1637:
1634:
1632:
1629:
1627:
1624:
1622:
1619:
1617:
1614:
1612:
1609:
1607:
1604:
1602:
1599:
1597:
1594:
1593:
1590:
1583:
1580:
1578:
1575:
1573:
1570:
1568:
1565:
1563:
1560:
1558:
1555:
1553:
1550:
1549:
1541:
1538:
1536:
1533:
1531:
1528:
1526:
1523:
1521:
1518:
1514:
1511:
1509:
1506:
1505:
1504:
1501:
1497:
1494:
1492:
1489:
1488:
1487:
1484:
1483:
1480:
1474:
1462:
1459:
1457:
1454:
1452:
1449:
1445:
1442:
1440:
1437:
1436:
1434:
1431:
1426:
1422:
1419:
1416:
1412:
1409:
1408:
1406:
1403:
1401:
1398:
1396:
1393:
1391:
1388:
1385:
1382:
1380:
1377:
1375:
1372:
1367:
1363:
1359:
1356:
1354:
1351:
1348:
1344:
1341:
1340:
1338:
1334:
1330:
1327:
1324:
1321:
1318:
1315:
1312:
1308:
1305:
1303:
1300:
1296:
1293:
1292:
1290:
1286:
1283:
1282:
1279:
1264:
1261:
1258:
1255:
1254:
1252:
1247:
1244:
1242:
1239:
1238:Frank Rowlett
1235:
1231:
1228:
1225:
1222:
1219:
1216:
1215:
1213:
1211:
1207:
1204:
1202:
1201:Roger Needham
1198:
1197:David Wheeler
1194:
1191:
1189:
1186:
1182:
1179:
1176:
1172:
1168:
1164:
1161:
1159:
1158:Roger Needham
1155:
1154:David Wheeler
1151:
1148:
1143:
1139:
1135:
1132:
1131:
1129:
1125:
1121:
1118:
1115:
1111:
1108:
1105:
1102:
1100:
1096:
1092:
1091:Ross Anderson
1088:
1085:
1082:
1078:
1075:
1072:
1069:
1065:
1061:
1058:
1056:
1053:
1049:
1046:
1045:
1043:
1040:
1037:
1034:
1031:
1028:
1025:
1022:
1019:
1016:
1013:
1010:
1007:
1003:
999:
996:
993:
989:
986:
983:
980:
978:
974:
970:
966:
962:
958:
955:
952:
949:
946:
943:
941:
940:Ross Anderson
937:
934:
931:
928:
925:
922:
920:
916:
913:
910:
907:
903:
899:
896:
893:
890:
887:
883:
879:
875:
872:
869:
865:
861:
858:
855:
851:
850:Hierocrypt-L1
848:
845:
841:
838:
835:
832:
829:
825:
822:
820:
817:
814:
811:
808:
805:
802:
799:
796:
793:
790:
787:
784:
780:
777:
774:
770:
767:
762:
758:
755:
754:
752:
748:
744:
740:
737:
734:
730:
726:
723:
721:
718:
714:
711:
709:
708:Ross Anderson
705:
702:
699:
696:
693:
689:
685:
681:
677:
673:
670:
668:
667:Horst Feistel
664:
661:
659:
656:
655:
653:
646:
645:Block ciphers
639:
636:
632:
629:
627:
624:
623:
622:
619:
617:
614:
612:
609:
604:
601:
600:
598:
594:
591:
586:
582:
578:
575:
574:
572:
568:
564:
561:
559:
556:
553:
550:
547:
543:
540:
537:
533:
530:
528:
525:
523:
520:
517:
514:
512:
509:
505:
501:
497:
493:
490:
488:
487:Ross Anderson
484:
481:
479:
475:
471:
467:
464:
463:
462:
459:
456:
453:
451:
448:
446:
443:
440:
436:
432:
429:
428:
425:
419:
406:
403:
401:
398:
396:
393:
391:
388:
387:
384:
383:Transposition
375:
372:
370:
367:
366:
365:
362:
358:
355:
353:
350:
348:
345:
344:
343:
340:
336:
333:
331:
330:Atbash cipher
328:
326:
325:Affine cipher
323:
319:
316:
315:
314:
313:Caesar cipher
311:
310:
308:
307:
304:
285:
282:
280:
277:
275:
272:
271:
270:
267:
265:
262:
260:
257:
256:
254:
250:
238:
235:
233:
232:Steganography
230:
228:
225:
223:
220:
218:
215:
214:
206:
203:
201:
198:
196:
193:
191:
190:Onion routing
188:
186:
183:
181:
178:
176:
173:
171:
168:
166:
163:
161:
158:
156:
153:
151:
148:
146:
143:
142:
134:
133:Alice and Bob
131:
129:
126:
124:
121:
119:
116:
114:
111:
109:
106:
104:
101:
99:
95:
92:
90:
89:Cryptographer
87:
86:
80:
78:
74:
70:
66:
62:
58:
54:
50:
46:
45:
40:
38:
32:
27:
19:
2556:. Retrieved
2552:
2543:
2395:Clipper Chip
2361:
2345:
2330:Legal issues
2323:
2246:Open efforts
2083:Malleability
1955:Slide attack
1838:
1688:FIPS PUB 113
1361:
1346:
1240:
1187:
1099:Lars Knudsen
1054:
960:
878:James Massey
864:Pascal Junod
840:Hierocrypt-3
719:
552:One-time pad
499:
303:Substitution
185:Pseudonymity
128:Tabula recta
48:
44:Cryptography
42:
41:
34:
26:
2493:Cryptologia
2422:David Chaum
2341:Free speech
1834:– by
1540:Merkle tree
1400:NTRUEncrypt
1302:Chor-Rivest
1295:ACE Encrypt
1210:Joan Daemen
1195:– by
1165:– by
1152:– by
690:selection;
680:Joan Daemen
595:– an
577:CipherSaber
374:Hill cipher
65:engineering
57:mathematics
53:information
2683:Categories
2558:2020-06-26
2535:References
2391:Key escrow
2142:Rongorongo
2127:Chaocipher
1960:XSL attack
1812:RIPEMD-160
1724:Ron Rivest
1664:Encrypted
1631:Passphrase
1572:Otway–Rees
1439:Rabin-SAEP
1163:Triple DES
1064:Ron Rivest
1052:Ron Rivest
930:Kuznyechik
826:– a
470:Siemens AG
405:VIC cipher
113:Ciphertext
98:decryption
94:Encryption
49:cryptology
29:See also:
2440:Espionage
2380:software.
2098:Freshness
1868:Classical
1850:Whirlpool
1690:and IETF
1589:Weak keys
1353:ECIES-KEM
1095:Eli Biham
945:LOKI89/91
834:Grand Cru
795:CS-Cipher
631:SOBER-t32
626:SOBER-t16
579:– (
542:MULTI-S01
522:Leviathan
498:, called
472:, called
450:Chameleon
297:Classical
118:Plaintext
69:ATM cards
2694:Outlines
2518:See also
2313:CrypTool
2307:CRYPTREC
1852:–
1816:CRYPTREC
1802:Streebog
1780:CRYPTREC
1774:–
1766:CRYPTREC
1760:–
1752:CRYPTREC
1746:–
1738:CRYPTREC
1705:–
1678:–
1621:Password
1425:CRYPTREC
1423:–
1421:RSA-OAEP
1413:–
1366:CRYPTREC
1360:–
1345:–
1337:CRYPTREC
1331:–
1329:PSEC-KEM
1317:El Gamal
1311:CRYPTREC
1287:–
1175:CRYPTREC
1138:Rijndael
1124:Rijndael
1110:SHACAL-2
1104:SHACAL-1
1081:CRYPTREC
1062:–
1006:CRYPTREC
1000:–
911:security
860:IDEA NXT
854:CRYPTREC
844:CRYPTREC
783:CRYPTREC
773:CRYPTREC
757:CAST-256
739:CAST-128
733:CRYPTREC
725:Camellia
713:Blowfish
692:CRYPTREC
603:ChaCha20
571:CRYPTREC
546:CRYPTREC
536:CRYPTREC
534:–
527:LILI-128
474:STURGEON
2411:Patents
2289:eSTREAM
2234:ECHELON
1772:SHA-512
1758:SHA-384
1744:SHA-256
1666:CBC-MAC
1496:OpenPGP
1444:HIME(R)
1411:RSA-KEM
1285:ACE-KEM
1181:Twofish
1171:Lucifer
1087:Serpent
1024:NOEKEON
982:MAGENTA
957:Lucifer
597:eSTREAM
593:Salsa20
390:Scytale
292:Ciphers
37:outline
2475:, and
2301:NESSIE
2293:ECRYPT
2279:NESSIE
2230:SIGINT
1895:Modern
1854:NESSIE
1844:Snefru
1839:et al.
1794:using
1776:NESSIE
1762:NESSIE
1748:NESSIE
1707:NESSIE
1680:NESSIE
1670:NESSIE
1415:NESSIE
1333:NESSIE
1289:NESSIE
1241:et al.
1230:SIGABA
1224:Purple
1218:Enigma
1199:&
1188:et al.
1156:&
1134:Square
1114:NESSIE
1077:SC2000
1055:et al.
1018:Nimbus
1012:MISTY2
1002:NESSIE
998:MISTY1
994:et al.
961:et al.
951:LOKI97
919:Rijmen
915:KHAZAD
906:W-CDMA
902:MISTY1
898:KASUMI
888:Zurich
880:&
866:&
729:NESSIE
720:et al.
698:Anubis
688:NESSIE
558:Panama
496:Lorenz
433:&
395:Grille
108:Cipher
75:, and
63:, and
2407:(DRM)
2369:DeCSS
1832:Tiger
1788:SHA-3
1730:SHA-1
1697:TTMAC
1491:X.509
1379:Kyber
1343:ECIES
1257:JN-25
1246:TypeX
1206:3-Way
1120:Shark
1071:SAFER
894:(IBC)
882:X Lai
813:DES-X
761:CAST6
743:CAST5
621:SOBER
516:ISAAC
511:HELIX
500:tunny
318:ROT13
284:Ultra
2393:and
2273:NIST
2201:RFCs
2173:NIST
1822:RTR0
1806:GOST
1703:UMAC
1676:HMAC
1636:Salt
1467:Keys
1374:EPOC
1358:ECDH
1193:XTEA
1030:NUSH
988:Mars
936:LION
824:GDES
819:FEAL
807:DEAL
789:CMEA
749:and
704:BEAR
682:and
676:NIST
638:WAKE
616:SNOW
611:SEAL
532:MUGI
483:Pike
455:FISH
445:BMGL
435:A5/2
431:A5/1
251:and
123:Code
47:(or
2416:RSA
2378:PGP
2256:NBS
1734:NSA
1720:MD5
1692:RFC
1461:XTR
1405:RSA
1150:TEA
1142:AES
1128:AES
1060:RC5
1048:RC6
1042:RC2
977:DES
973:NBS
969:NSA
965:IBM
963:of
886:ETH
884:of
828:DES
581:RC4
567:MIT
563:RC4
502:by
476:by
439:GSM
2685::
2551:.
2350:-
1686:,
1364:,
1236:,
1097:,
1093:,
686:;
585:IV
569:;
544:-
79:.
71:,
59:,
2592:e
2585:t
2578:v
2561:.
1916:;
1798:.
1140:/
1126:/
1036:Q
971:/
759:(
741:(
96:/
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.