Knowledge

Outline of cryptography

Source đź“ť

2472: 2429: 1736:
160-bit digest, an FIPS standard; the first released version was defective and replaced by this; NIST/NSA have released several variants with longer 'digest' lengths;
1825: 1373: 449: 2115: 2190: 2222:(GCHQ) – internal evaluation/selections, a division is charged with developing and recommending cryptographic standards for the UK government 2175:
to produce standards in many areas to guide operations of the US Federal government; many FIPS publications are ongoing and related to cryptography
1262: 510: 2184: 972: 863: 1301: 1438: 2698: 2667: 2457: 1352: 625: 258: 2642: 1328: 2315:– an e-learning freeware programme in English and German— exhaustive educational tool about cryptography and cryptanalysis 2662: 2657: 2487: 1443: 1410: 1284: 2590: 1383: 1011: 2652: 2498: 2168: 1696: 881: 873: 2637: 2446: 2219: 1821: 1659: 444: 17: 2622: 2617: 2238: 2178: 1924: 2632: 2627: 2610: 1625: 2181:(ANSI) – standardization process that produces many standards in many areas; some are cryptography related, ongoing) 2647: 2373: 1196: 1153: 2309:– evaluation/recommendation program sponsored by the Japanese government; draft recommendations published 2003 2193:(IEEE) – standardization process produces many standards in many areas; some are cryptography related, ongoing 2399: 2187:(ISO) – standardization process produces many standards in many areas; some are cryptography related, ongoing 1878: 407:– complex hand cypher used by at least one Soviet spy in the early 1950s; it proved quite secure for the time 204: 2335: 2196: 2072: 1712: 1529: 651: 2216:(NSA) – internal evaluation/selections, charged with assisting NIST in its cryptographic responsibilities 1791: 356: 30: 2688: 174: 149: 2583: 2528: 2268: 1534: 1524: 1141: 1127: 671: 2599: 2523: 2225: 2082: 1654: 1647: 1322: 341: 2346: 1919: 2404: 2102: 2048: 1939: 1485: 1394: 1149: 268: 221: 216: 2251: 2213: 2097: 2028: 1981: 1556: 1277: 976: 827: 800: 363: 263: 252: 68: 1220:– WWII German rotor cypher machine—many variants, any user networks for most of the variants 2576: 2146: 2043: 1986: 1610: 473: 417: 248: 2385: 2355: 2324: 1996: 1991: 1929: 1512: 1502: 1455: 1226:– highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain 2482: 2476: 2131: 2105: â€“ Cryptographic principle that states everything except the key can be public knowledge 1849: 1843: 1831: 1561: 1519: 1507: 1450: 1389: 897: 584: 394: 2511: 2451: 2200: 1934: 1883: 1699:– (Two-Track-MAC) NESSIE selection MAC; K.U.Leuven (Belgium) & debis AG (Germany) 1691: 382: 283: 273: 226: 763:) – 128-bit block; the successor to CAST-128 and a candidate for the AES competition 8: 2377: 2351: 2003: 1944: 1888: 1635: 1566: 465: 460: 302: 236: 76: 862:– project name FOX, 64-bit and 128-bit block family; Mediacrypt (Switzerland); by 2151: 1949: 1908: 1873: 1605: 1595: 1551: 1478: 1472: 1432: 891: 833: 521: 399: 179: 346: 2693: 2434: 2092: 2077: 2062: 1913: 1615: 1600: 1576: 724: 712: 164: 154: 144: 102: 2136: 2018: 1903: 1856:
selection hash function, Scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium)
1835: 1233: 1217: 1170: 1090: 1086: 956: 939: 923: 750: 707: 486: 194: 60: 2415: 2362: 2087: 1969: 1795: 1581: 1404: 1133: 1017: 991: 778: 768: 697: 557: 368: 932:– Russian 128-bit block cipher, defined in GOST R 34.12-2015 and RFC 7801. 2282: 2262: 2008: 1683: 1571: 1306: 1184: 1166: 1119: 918: 908: 867: 746: 716: 683: 662: 657: 515: 503: 477: 423: 351: 334: 278: 199: 159: 36: 2682: 2296: 2121: 2067: 2033: 2013: 1861: 1640: 1265:– superencrypted code used by the Royal Navy in the 1930s and into WWII 1237: 1200: 1157: 987: 935: 849: 788: 703: 666: 644: 637: 610: 491: 482: 454: 329: 324: 312: 231: 189: 169: 132: 88: 2394: 2199:(IETF) – standardization process that produces many standards called 1976: 1954: 1687: 1098: 877: 839: 580: 562: 551: 495: 184: 127: 43: 2454:– United Kingdom, India, Ireland, Malaysia, and formerly New Zealand 1173:
design team—not all triple uses of DES increase security, Tuchman's does;
2492: 2421: 2340: 1539: 1399: 1294: 1223: 1209: 679: 576: 373: 64: 56: 52: 2390: 2141: 2126: 1959: 1811: 1723: 1630: 1162: 1063: 1051: 1035: 929: 469: 404: 112: 97: 93: 2473:
List of important publications in computer science § Cryptography
2568: 2439: 1094: 794: 630: 554:– Vernam and Mauborgne, patented 1919; an extreme stream cypher 541: 117: 2548: 938:– block cypher built from stream cypher and hash function, by 2312: 2306: 1815: 1801: 1779: 1765: 1751: 1737: 1620: 1588: 1424: 1420: 1365: 1336: 1316: 1310: 1174: 1137: 1123: 1109: 1103: 1080: 1005: 859: 853: 843: 782: 772: 756: 738: 732: 691: 602: 570: 545: 535: 526: 72: 1814:– developed in Europe for the RIPE project, 160-bit digest; 2410: 2288: 2281:
Project – an evaluation/selection program sponsored by the
2233: 1771: 1757: 1743: 1709:
selection MAC; Intel, UNevada Reno, IBM, Technion, & UC Davis
1665: 1495: 1180: 1023: 981: 596: 592: 389: 39:
is provided as an overview of and topical guide to cryptography:
2300: 2292: 2278: 2229: 1853: 1775: 1761: 1747: 1706: 1679: 1669: 1414: 1332: 1288: 1229: 1113: 1076: 1001: 997: 950: 914: 905: 901: 791:– cipher used in US cellphones, found to have weaknesses. 728: 687: 107: 1259:– WWII Japanese Navy superencyphered code; many variants 2501:– cryptography from the viewpoint of information theory 2368: 1787: 1729: 1722:– one of a series of message digest algorithms by Prof 1490: 1417:
selection asymmetric encryption scheme; ISO/IEC 18033-2 draft
1378: 1342: 1256: 1245: 1205: 1070: 812: 760: 742: 620: 565:(ARCFOUR) – one of a series by Professor Ron Rivest of 317: 2109: 1291:
selection asymmetric encryption scheme; IBM Zurich Research
1177:
recommendation (limited), only when used as in FIPS Pub 46-3
2272: 2261:
RIPE – division of the RACE project sponsored by the
2255: 2172: 1808:
hash function defined in obsolete standard GOST R 34.11-94.
1805: 1702: 1675: 1357: 1192: 1029: 944: 823: 818: 806: 675: 615: 531: 434: 430: 122: 1790:– originally known as Keccak; was the winner of the 1339:
recommendation only in DEM construction w/SEC1 parameters
2466: 1804:– Russian algorithm created to replace an obsolete 1733: 1719: 1460: 1059: 1047: 1041: 968: 964: 885: 745:) – 64-bit block; one of a series of algorithms by 706:– built from a stream cypher and hash function, by 566: 438: 2495:– quarterly journal focusing on historical aspects 2203:) in many areas; some are cryptography related, ongoing) 2157: 753:, insistent that the name is not due to their initials 2376:- Arms Export Control Act investigation regarding the 2271:(AES) – a "break-off" competition sponsored by 1778:
selection hash function, FIPS 180-2, 512-bit digest;
1764:
selection hash function, FIPS 180-2, 384-bit digest;
1750:
selection hash function, FIPS 180-2, 256-bit digest;
1335:
selection asymmetric encryption scheme; NTT (Japan);
1004:
selection 64-bit block; Mitsubishi Electric (Japan);
55:. Modern cryptography intersects the disciplines of 1271: 138: 1014:– 128-bit block: Mitsubishi Electric (Japan) 815:– a variant of DES to increase the key size. 411: 2191:Institute of Electrical and Electronics Engineers 678:selection for the AES, FIPS 197; Created 2001—by 2680: 1050:– variable block length; AES finalist, by 1646: 2185:International Organization for Standardization 917:– 64-bit block designed by Barretto and 2584: 2319: 1214:Polyalphabetic substitution machine cyphers 2458:Regulation of Investigatory Powers Act 2000 1824:– one of Retter series; developed by 1362:Elliptic Curve Diffie-Hellman key agreement 1347:Elliptic Curve Integrated Encryption System 1276: 953:– 128-bit block cipher, AES candidate 803:(DES) – 64-bit block; FIPS 46-3, 1976 731:selection (NTT & Mitsubishi Electric); 259:Japanese cryptology from the 1500s to Meiji 210: 2591: 2577: 2241:(CSE) – Canadian intelligence agency 2171:(FIPS) Publication Program – run by 1044:– 64-bit block, variable key length 1032:– variable block length (64-256-bit) 242: 82: 2488:Encyclopedia of Cryptography and Security 2295:; motivated by the failure of all of the 2162: 2116:Undeciphered historical codes and ciphers 2110:Undeciphered historical codes and ciphers 870:of Swiss Institute of Technology Lausanne 809:– an AES candidate derived from DES 2354:'s challenge to the restrictions on the 2207: 2169:Federal Information Processing Standards 2056: 2499:Communication Theory of Secrecy Systems 1183:– 128-bit block; AES finalist by 1089:– 128-bit block; AES finalist by 874:International Data Encryption Algorithm 830:variant designed to speed up encryption 494:– WWII mechanical onetime pad by 468:– WWII mechanical onetime pad by 67:. Applications of cryptography include 51:) – practice and study of hiding 14: 2681: 2598: 2467:Academic and professional publications 2447:Cryptography laws in different nations 2220:Government Communications Headquarters 1846:– NIST hash function competition 1660:Keyed-hash message authentication code 2572: 2239:Communications Security Establishment 2179:American National Standards Institute 1925:Impossible differential cryptanalysis 1545: 1477: 2158:Organizations and selection projects 1626:Password-authenticated key agreement 1384:Merkle–Hellman knapsack cryptosystem 1325:– (discrete logarithm variant) 573:recommended limited to 128-bit key 24: 2699:Cryptography lists and comparisons 2505: 1232:– WWII US cypher machine by 674:(Rijndael) – 128-bit block; 437:– ciphers specified for the 25: 2710: 2549:"Research Paper - factorable.net" 422: 2430:Cryptography and law enforcement 2400:Digital Millennium Copyright Act 1860: 1272:Modern asymmetric-key algorithms 1253:Hybrid code/cypher combinations 643: 381: 205:Indistinguishability obfuscation 139:Uses of cryptographic techniques 2668:Technology and applied sciences 2336:AACS encryption key controversy 2329: 2245: 2197:Internet Engineering Task Force 2073:Ciphertext indistinguishability 1713:Oblivious Pseudorandom Function 1530:Secure key issuing cryptography 900:– 64-bit block; based on 652:Block cipher modes of operation 485:– improvement on FISH by 412:Modern symmetric-key algorithms 301: 2541: 1867: 1792:NIST hash function competition 1248:– WWII UK cypher machine 1112:– 256-bit block cypher; 904:, adopted for next generation 357:Homophonic substitution cipher 31:Index of cryptography articles 13: 1: 2643:Natural and physical sciences 2534: 2258:selection process, ended 1976 1073:– variable block length 175:Dining cryptographers problem 150:Secure multiparty computation 2529:Outline of computer security 2269:Advanced Encryption Standard 1648:Cryptographic hash functions 1587: 1535:Certificateless cryptography 1525:Certificate-based encryption 947:– 64-bit block ciphers 926:– 64-bit block ciphers 876:(IDEA) – 64-bit block; 672:Advanced Encryption Standard 583:variant with 10 byte random 309:Monoalphabetic substitution 296: 7: 2663:Society and social sciences 2658:Religion and belief systems 2524:Outline of computer science 2517: 2226:Defence Signals Directorate 1655:Message authentication code 1323:Elliptic curve cryptography 967:, early 1970s; modified by 441:cellular telephone standard 342:Polyalphabetic substitution 10: 2715: 2470: 2347:Bernstein v. United States 2320:Influential cryptographers 2291:– program funded by 2113: 1920:Differential cryptanalysis 1470: 1319:– discrete logarithm 1116:selection Gemplus (France) 649: 605:– A Salsa20 variant. 518:– intended as a PRNG 415: 291: 246: 28: 2606: 2418:– now public domain 2405:Digital rights management 2228:(DSD) – Australian 2049:Rubber-hose cryptanalysis 1940:Meet-in-the-middle attack 1894: 1740:recommendation (limited) 1486:Public key infrastructure 1395:Niederreiter cryptosystem 990:– AES finalist, by 715:– 64-bit block; by 269:World War II cryptography 222:Post-quantum cryptography 217:Multivariate cryptography 2424:– and digital cash 2252:Data Encryption Standard 2214:National Security Agency 2029:Man-in-the-middle attack 1818:recommendation (limited) 1557:Man-in-the-middle attack 1278:Asymmetric key algorithm 1208:– 96-bit block by 1008:recommendation (limited) 856:recommendation (limited) 801:Data Encryption Standard 785:recommendation (limited) 364:Polygraphic substitution 264:World War I cryptography 253:Timeline of cryptography 211:Branches of cryptography 2653:Philosophy and thinking 2358:from the United States. 2147:Shugborough inscription 2044:Black-bag cryptanalysis 1611:Key derivation function 1466: 1386:– knapsack scheme 1309:– key agreement; 1130:, by Daemen and Rijmen 1122:– grandfather of 1079:– 128-bit block; 842:– 128-bit block; 771:– 128-bit block; 727:– 128-bit block; 418:Symmetric-key algorithm 249:History of cryptography 243:History of cryptography 83:Essence of cryptography 2460:– United Kingdom 2386:Export of cryptography 2356:export of cryptography 2325:List of cryptographers 2163:Cryptography standards 2103:Kerckhoffs's principle 1930:Integral cryptanalysis 1726:of MIT; 128-bit digest 1513:Certificate revocation 1503:Public key certificate 1456:Threshold cryptosystem 1349:, Certicom Corporation 1144:, by Daemen and Rijmen 852:– 64-bit block; 781:– 64-bit block; 18:Topics in cryptography 2638:Mathematics and logic 2483:Journal of Cryptology 2477:Books on cryptography 2471:Further information: 2435:Telephone wiretapping 2208:General cryptographic 2057:Robustness properties 1900:Symmetric algorithms 1732:– developed at 1520:ID-based cryptography 1508:Certificate authority 1451:Paillier cryptosystem 1390:McEliece cryptosystem 1106:– 160-bit block 1038:– 128-bit block 1026:– 128-bit block 984:– AES candidate 836:– 128-bit block 700:– 128-bit block 650:Further information: 457:– by Siemens AG 2689:Outlines of sciences 2623:Geography and places 2618:Culture and the arts 2512:Security engineering 2452:Official Secrets Act 2004:Side channel attacks 1935:Linear cryptanalysis 1884:Index of coincidence 1020:– 64-bit block 797:– 64-bit block 274:Reservehandverfahren 227:Quantum cryptography 2352:Daniel J. Bernstein 2068:Random oracle model 1945:Mod-n cryptanalysis 1889:Kasiski examination 1826:Maciej A. Czyzewski 1567:Offline private key 959:– by Tuchman 665:– pattern by 599:recommended cipher 587:, easy to implement 466:Geheimfernschreiber 461:WWII 'Fish' cyphers 237:Visual cryptography 77:electronic commerce 2633:History and events 2628:Health and fitness 2600:Knowledge outlines 2152:Voynich manuscript 2132:D'Agapeyeff cipher 1950:Related-key attack 1909:Brute force attack 1874:Frequency analysis 1606:Related key attack 1596:Brute force attack 1546:Transport/exchange 1479:Key authentication 1473:Key (cryptography) 1435:– factoring 1433:Rabin cryptosystem 1407:– factoring 1136:– father of 892:Iraqi Block Cipher 400:Permutation cipher 180:Anonymous remailer 165:Digital signatures 145:Commitment schemes 73:computer passwords 2676: 2675: 2611:General reference 2265:, ended mid-1980s 2093:Forward anonymity 2078:Semantic security 2063:Provable security 2040:External attacks 1982:Chosen-ciphertext 1616:Key strengthening 1601:Dictionary attack 1577:Trusted paper key 1562:Needham–Schroeder 155:Electronic voting 103:Cryptographic key 16:(Redirected from 2706: 2593: 2586: 2579: 2570: 2569: 2563: 2562: 2560: 2559: 2545: 2232:agency, part of 2137:Dorabella cipher 2025:Network attacks 2019:Cold boot attack 1987:Chosen-plaintext 1966:Hash functions: 1904:Boomerang attack 1879:Contact analysis 1828:; 160-bit digest 1234:William Friedman 1169:, leader of the 975:and released as 924:Khufu and Khafre 751:Stafford Tavares 195:Digital currency 61:computer science 21: 2714: 2713: 2709: 2708: 2707: 2705: 2704: 2703: 2679: 2678: 2677: 2672: 2648:People and self 2602: 2597: 2567: 2566: 2557: 2555: 2547: 2546: 2542: 2537: 2520: 2508: 2506:Allied sciences 2479: 2469: 2374:Phil Zimmermann 2363:Junger v. Daley 2332: 2322: 2303:, ended in 2008 2285:, ended in 2002 2275:, ended in 2001 2248: 2210: 2165: 2160: 2118: 2114:Main category: 2112: 2088:Forward secrecy 2059: 1997:Known-plaintext 1992:Ciphertext-only 1970:Birthday attack 1897: 1870: 1865: 1796:sponge function 1682:selection MAC; 1668:(EMAC) – 1651: 1592: 1582:Wide Mouth Frog 1548: 1482: 1475: 1469: 1281: 1274: 992:Don Coppersmith 779:CIPHERUNICORN-E 769:CIPHERUNICORN-A 694:recommendation. 654: 648: 492:Schlusselzusatz 427: 420: 414: 386: 369:Playfair cipher 347:Vigenère cipher 306: 299: 294: 255: 247:Main articles: 245: 213: 141: 85: 33: 23: 22: 15: 12: 11: 5: 2712: 2702: 2701: 2696: 2691: 2674: 2673: 2671: 2670: 2665: 2660: 2655: 2650: 2645: 2640: 2635: 2630: 2625: 2620: 2614: 2613: 2607: 2604: 2603: 2596: 2595: 2588: 2581: 2573: 2565: 2564: 2553:factorable.net 2539: 2538: 2536: 2533: 2532: 2531: 2526: 2519: 2516: 2515: 2514: 2507: 2504: 2503: 2502: 2496: 2490: 2485: 2468: 2465: 2464: 2463: 2462: 2461: 2455: 2444: 2443: 2442: 2437: 2427: 2426: 2425: 2419: 2408: 2402: 2397: 2388: 2383: 2382: 2381: 2371: 2366: 2359: 2338: 2331: 2328: 2321: 2318: 2317: 2316: 2310: 2304: 2297:stream ciphers 2286: 2283:European Union 2276: 2266: 2263:European Union 2259: 2254:(DES) – 2247: 2244: 2243: 2242: 2236: 2223: 2217: 2209: 2206: 2205: 2204: 2194: 2188: 2182: 2176: 2164: 2161: 2159: 2156: 2155: 2154: 2149: 2144: 2139: 2134: 2129: 2124: 2111: 2108: 2107: 2106: 2100: 2095: 2090: 2085: 2080: 2075: 2070: 2065: 2058: 2055: 2054: 2053: 2052: 2051: 2046: 2038: 2037: 2036: 2031: 2023: 2022: 2021: 2016: 2011: 2009:Power analysis 2001: 2000: 1999: 1994: 1989: 1984: 1974: 1973: 1972: 1964: 1963: 1962: 1957: 1952: 1947: 1942: 1937: 1932: 1927: 1922: 1917: 1914:Davies' attack 1911: 1906: 1896: 1893: 1892: 1891: 1886: 1881: 1876: 1869: 1866: 1864: 1859: 1858: 1857: 1847: 1841: 1829: 1819: 1809: 1799: 1785: 1784: 1783: 1782:recommendation 1769: 1768:recommendation 1755: 1754:recommendation 1727: 1717: 1716: 1715: 1710: 1700: 1694: 1684:ISO/IEC 9797-1 1673: 1657: 1650: 1645: 1644: 1643: 1638: 1633: 1628: 1623: 1618: 1613: 1608: 1603: 1598: 1591: 1586: 1585: 1584: 1579: 1574: 1569: 1564: 1559: 1554: 1552:Diffie–Hellman 1547: 1544: 1543: 1542: 1537: 1532: 1527: 1522: 1517: 1516: 1515: 1510: 1500: 1499: 1498: 1493: 1481: 1476: 1471:Main article: 1468: 1465: 1464: 1463: 1458: 1453: 1448: 1447: 1446: 1441: 1430: 1429: 1428: 1427:recommendation 1418: 1402: 1397: 1392: 1387: 1381: 1376: 1371: 1370: 1369: 1368:recommendation 1355: 1350: 1326: 1320: 1314: 1313:recommendation 1307:Diffie-Hellman 1304: 1299: 1298: 1297: 1280: 1275: 1273: 1270: 1269: 1268: 1267: 1266: 1263:Naval Cypher 3 1260: 1251: 1250: 1249: 1243: 1227: 1221: 1212: 1203: 1190: 1185:Bruce Schneier 1178: 1167:Walter Tuchman 1160: 1147: 1146: 1145: 1117: 1107: 1101: 1084: 1083:recommendation 1074: 1068: 1067: 1066: 1057: 1039: 1033: 1027: 1021: 1015: 1009: 995: 985: 979: 954: 948: 942: 933: 927: 921: 912: 909:cellular phone 895: 889: 871: 868:Serge Vaudenay 857: 847: 846:recommendation 837: 831: 821: 816: 810: 804: 798: 792: 786: 776: 775:recommendation 766: 765: 764: 747:Carlisle Adams 736: 735:recommendation 722: 717:Bruce Schneier 710: 701: 695: 684:Vincent Rijmen 669: 663:Feistel cipher 660: 658:Product cipher 647: 642: 641: 640: 635: 634: 633: 628: 618: 613: 608: 607: 606: 590: 589: 588: 560: 555: 549: 548:recommendation 539: 538:recommendation 529: 524: 519: 513: 508: 507: 506: 504:Bletchley Park 489: 480: 478:Bletchley Park 458: 452: 447: 442: 426: 424:Stream ciphers 421: 416:Main article: 413: 410: 409: 408: 402: 397: 392: 385: 380: 379: 378: 377: 376: 371: 361: 360: 359: 354: 352:Autokey cipher 349: 339: 338: 337: 335:Keyword cipher 332: 327: 322: 321: 320: 305: 300: 298: 295: 293: 290: 289: 288: 287: 286: 281: 279:Venona project 276: 266: 261: 244: 241: 240: 239: 234: 229: 224: 219: 212: 209: 208: 207: 202: 200:Secret sharing 197: 192: 187: 182: 177: 172: 170:Crypto systems 167: 162: 160:Authentication 157: 152: 147: 140: 137: 136: 135: 130: 125: 120: 115: 110: 105: 100: 91: 84: 81: 35:The following 9: 6: 4: 3: 2: 2711: 2700: 2697: 2695: 2692: 2690: 2687: 2686: 2684: 2669: 2666: 2664: 2661: 2659: 2656: 2654: 2651: 2649: 2646: 2644: 2641: 2639: 2636: 2634: 2631: 2629: 2626: 2624: 2621: 2619: 2616: 2615: 2612: 2609: 2608: 2605: 2601: 2594: 2589: 2587: 2582: 2580: 2575: 2574: 2571: 2554: 2550: 2544: 2540: 2530: 2527: 2525: 2522: 2521: 2513: 2510: 2509: 2500: 2497: 2494: 2491: 2489: 2486: 2484: 2481: 2480: 2478: 2474: 2459: 2456: 2453: 2450: 2449: 2448: 2445: 2441: 2438: 2436: 2433: 2432: 2431: 2428: 2423: 2420: 2417: 2414: 2413: 2412: 2409: 2406: 2403: 2401: 2398: 2396: 2392: 2389: 2387: 2384: 2379: 2375: 2372: 2370: 2367: 2365: 2364: 2360: 2357: 2353: 2349: 2348: 2344: 2343: 2342: 2339: 2337: 2334: 2333: 2327: 2326: 2314: 2311: 2308: 2305: 2302: 2299:submitted to 2298: 2294: 2290: 2287: 2284: 2280: 2277: 2274: 2270: 2267: 2264: 2260: 2257: 2253: 2250: 2249: 2240: 2237: 2235: 2231: 2227: 2224: 2221: 2218: 2215: 2212: 2211: 2202: 2198: 2195: 2192: 2189: 2186: 2183: 2180: 2177: 2174: 2170: 2167: 2166: 2153: 2150: 2148: 2145: 2143: 2140: 2138: 2135: 2133: 2130: 2128: 2125: 2123: 2122:Beale ciphers 2120: 2119: 2117: 2104: 2101: 2099: 2096: 2094: 2091: 2089: 2086: 2084: 2081: 2079: 2076: 2074: 2071: 2069: 2066: 2064: 2061: 2060: 2050: 2047: 2045: 2042: 2041: 2039: 2035: 2034:Replay attack 2032: 2030: 2027: 2026: 2024: 2020: 2017: 2015: 2014:Timing attack 2012: 2010: 2007: 2006: 2005: 2002: 1998: 1995: 1993: 1990: 1988: 1985: 1983: 1980: 1979: 1978: 1977:Attack models 1975: 1971: 1968: 1967: 1965: 1961: 1958: 1956: 1953: 1951: 1948: 1946: 1943: 1941: 1938: 1936: 1933: 1931: 1928: 1926: 1923: 1921: 1918: 1915: 1912: 1910: 1907: 1905: 1902: 1901: 1899: 1898: 1890: 1887: 1885: 1882: 1880: 1877: 1875: 1872: 1871: 1863: 1862:Cryptanalysis 1855: 1851: 1848: 1845: 1842: 1840: 1837: 1836:Ross Anderson 1833: 1830: 1827: 1823: 1820: 1817: 1813: 1810: 1807: 1803: 1800: 1797: 1793: 1789: 1786: 1781: 1777: 1773: 1770: 1767: 1763: 1759: 1756: 1753: 1749: 1745: 1742: 1741: 1739: 1735: 1731: 1728: 1725: 1721: 1718: 1714: 1711: 1708: 1704: 1701: 1698: 1695: 1693: 1689: 1685: 1681: 1677: 1674: 1672:selection MAC 1671: 1667: 1663: 1662: 1661: 1658: 1656: 1653: 1652: 1649: 1642: 1641:Factorization 1639: 1637: 1634: 1632: 1629: 1627: 1624: 1622: 1619: 1617: 1614: 1612: 1609: 1607: 1604: 1602: 1599: 1597: 1594: 1593: 1590: 1583: 1580: 1578: 1575: 1573: 1570: 1568: 1565: 1563: 1560: 1558: 1555: 1553: 1550: 1549: 1541: 1538: 1536: 1533: 1531: 1528: 1526: 1523: 1521: 1518: 1514: 1511: 1509: 1506: 1505: 1504: 1501: 1497: 1494: 1492: 1489: 1488: 1487: 1484: 1483: 1480: 1474: 1462: 1459: 1457: 1454: 1452: 1449: 1445: 1442: 1440: 1437: 1436: 1434: 1431: 1426: 1422: 1419: 1416: 1412: 1409: 1408: 1406: 1403: 1401: 1398: 1396: 1393: 1391: 1388: 1385: 1382: 1380: 1377: 1375: 1372: 1367: 1363: 1359: 1356: 1354: 1351: 1348: 1344: 1341: 1340: 1338: 1334: 1330: 1327: 1324: 1321: 1318: 1315: 1312: 1308: 1305: 1303: 1300: 1296: 1293: 1292: 1290: 1286: 1283: 1282: 1279: 1264: 1261: 1258: 1255: 1254: 1252: 1247: 1244: 1242: 1239: 1238:Frank Rowlett 1235: 1231: 1228: 1225: 1222: 1219: 1216: 1215: 1213: 1211: 1207: 1204: 1202: 1201:Roger Needham 1198: 1197:David Wheeler 1194: 1191: 1189: 1186: 1182: 1179: 1176: 1172: 1168: 1164: 1161: 1159: 1158:Roger Needham 1155: 1154:David Wheeler 1151: 1148: 1143: 1139: 1135: 1132: 1131: 1129: 1125: 1121: 1118: 1115: 1111: 1108: 1105: 1102: 1100: 1096: 1092: 1091:Ross Anderson 1088: 1085: 1082: 1078: 1075: 1072: 1069: 1065: 1061: 1058: 1056: 1053: 1049: 1046: 1045: 1043: 1040: 1037: 1034: 1031: 1028: 1025: 1022: 1019: 1016: 1013: 1010: 1007: 1003: 999: 996: 993: 989: 986: 983: 980: 978: 974: 970: 966: 962: 958: 955: 952: 949: 946: 943: 941: 940:Ross Anderson 937: 934: 931: 928: 925: 922: 920: 916: 913: 910: 907: 903: 899: 896: 893: 890: 887: 883: 879: 875: 872: 869: 865: 861: 858: 855: 851: 850:Hierocrypt-L1 848: 845: 841: 838: 835: 832: 829: 825: 822: 820: 817: 814: 811: 808: 805: 802: 799: 796: 793: 790: 787: 784: 780: 777: 774: 770: 767: 762: 758: 755: 754: 752: 748: 744: 740: 737: 734: 730: 726: 723: 721: 718: 714: 711: 709: 708:Ross Anderson 705: 702: 699: 696: 693: 689: 685: 681: 677: 673: 670: 668: 667:Horst Feistel 664: 661: 659: 656: 655: 653: 646: 645:Block ciphers 639: 636: 632: 629: 627: 624: 623: 622: 619: 617: 614: 612: 609: 604: 601: 600: 598: 594: 591: 586: 582: 578: 575: 574: 572: 568: 564: 561: 559: 556: 553: 550: 547: 543: 540: 537: 533: 530: 528: 525: 523: 520: 517: 514: 512: 509: 505: 501: 497: 493: 490: 488: 487:Ross Anderson 484: 481: 479: 475: 471: 467: 464: 463: 462: 459: 456: 453: 451: 448: 446: 443: 440: 436: 432: 429: 428: 425: 419: 406: 403: 401: 398: 396: 393: 391: 388: 387: 384: 383:Transposition 375: 372: 370: 367: 366: 365: 362: 358: 355: 353: 350: 348: 345: 344: 343: 340: 336: 333: 331: 330:Atbash cipher 328: 326: 325:Affine cipher 323: 319: 316: 315: 314: 313:Caesar cipher 311: 310: 308: 307: 304: 285: 282: 280: 277: 275: 272: 271: 270: 267: 265: 262: 260: 257: 256: 254: 250: 238: 235: 233: 232:Steganography 230: 228: 225: 223: 220: 218: 215: 214: 206: 203: 201: 198: 196: 193: 191: 190:Onion routing 188: 186: 183: 181: 178: 176: 173: 171: 168: 166: 163: 161: 158: 156: 153: 151: 148: 146: 143: 142: 134: 133:Alice and Bob 131: 129: 126: 124: 121: 119: 116: 114: 111: 109: 106: 104: 101: 99: 95: 92: 90: 89:Cryptographer 87: 86: 80: 78: 74: 70: 66: 62: 58: 54: 50: 46: 45: 40: 38: 32: 27: 19: 2556:. Retrieved 2552: 2543: 2395:Clipper Chip 2361: 2345: 2330:Legal issues 2323: 2246:Open efforts 2083:Malleability 1955:Slide attack 1838: 1688:FIPS PUB 113 1361: 1346: 1240: 1187: 1099:Lars Knudsen 1054: 960: 878:James Massey 864:Pascal Junod 840:Hierocrypt-3 719: 552:One-time pad 499: 303:Substitution 185:Pseudonymity 128:Tabula recta 48: 44:Cryptography 42: 41: 34: 26: 2493:Cryptologia 2422:David Chaum 2341:Free speech 1834:– by 1540:Merkle tree 1400:NTRUEncrypt 1302:Chor-Rivest 1295:ACE Encrypt 1210:Joan Daemen 1195:– by 1165:– by 1152:– by 690:selection; 680:Joan Daemen 595:– an 577:CipherSaber 374:Hill cipher 65:engineering 57:mathematics 53:information 2683:Categories 2558:2020-06-26 2535:References 2391:Key escrow 2142:Rongorongo 2127:Chaocipher 1960:XSL attack 1812:RIPEMD-160 1724:Ron Rivest 1664:Encrypted 1631:Passphrase 1572:Otway–Rees 1439:Rabin-SAEP 1163:Triple DES 1064:Ron Rivest 1052:Ron Rivest 930:Kuznyechik 826:– a 470:Siemens AG 405:VIC cipher 113:Ciphertext 98:decryption 94:Encryption 49:cryptology 29:See also: 2440:Espionage 2380:software. 2098:Freshness 1868:Classical 1850:Whirlpool 1690:and IETF 1589:Weak keys 1353:ECIES-KEM 1095:Eli Biham 945:LOKI89/91 834:Grand Cru 795:CS-Cipher 631:SOBER-t32 626:SOBER-t16 579:– ( 542:MULTI-S01 522:Leviathan 498:, called 472:, called 450:Chameleon 297:Classical 118:Plaintext 69:ATM cards 2694:Outlines 2518:See also 2313:CrypTool 2307:CRYPTREC 1852:– 1816:CRYPTREC 1802:Streebog 1780:CRYPTREC 1774:– 1766:CRYPTREC 1760:– 1752:CRYPTREC 1746:– 1738:CRYPTREC 1705:– 1678:– 1621:Password 1425:CRYPTREC 1423:– 1421:RSA-OAEP 1413:– 1366:CRYPTREC 1360:– 1345:– 1337:CRYPTREC 1331:– 1329:PSEC-KEM 1317:El Gamal 1311:CRYPTREC 1287:– 1175:CRYPTREC 1138:Rijndael 1124:Rijndael 1110:SHACAL-2 1104:SHACAL-1 1081:CRYPTREC 1062:– 1006:CRYPTREC 1000:– 911:security 860:IDEA NXT 854:CRYPTREC 844:CRYPTREC 783:CRYPTREC 773:CRYPTREC 757:CAST-256 739:CAST-128 733:CRYPTREC 725:Camellia 713:Blowfish 692:CRYPTREC 603:ChaCha20 571:CRYPTREC 546:CRYPTREC 536:CRYPTREC 534:– 527:LILI-128 474:STURGEON 2411:Patents 2289:eSTREAM 2234:ECHELON 1772:SHA-512 1758:SHA-384 1744:SHA-256 1666:CBC-MAC 1496:OpenPGP 1444:HIME(R) 1411:RSA-KEM 1285:ACE-KEM 1181:Twofish 1171:Lucifer 1087:Serpent 1024:NOEKEON 982:MAGENTA 957:Lucifer 597:eSTREAM 593:Salsa20 390:Scytale 292:Ciphers 37:outline 2475:, and 2301:NESSIE 2293:ECRYPT 2279:NESSIE 2230:SIGINT 1895:Modern 1854:NESSIE 1844:Snefru 1839:et al. 1794:using 1776:NESSIE 1762:NESSIE 1748:NESSIE 1707:NESSIE 1680:NESSIE 1670:NESSIE 1415:NESSIE 1333:NESSIE 1289:NESSIE 1241:et al. 1230:SIGABA 1224:Purple 1218:Enigma 1199:& 1188:et al. 1156:& 1134:Square 1114:NESSIE 1077:SC2000 1055:et al. 1018:Nimbus 1012:MISTY2 1002:NESSIE 998:MISTY1 994:et al. 961:et al. 951:LOKI97 919:Rijmen 915:KHAZAD 906:W-CDMA 902:MISTY1 898:KASUMI 888:Zurich 880:& 866:& 729:NESSIE 720:et al. 698:Anubis 688:NESSIE 558:Panama 496:Lorenz 433:& 395:Grille 108:Cipher 75:, and 63:, and 2407:(DRM) 2369:DeCSS 1832:Tiger 1788:SHA-3 1730:SHA-1 1697:TTMAC 1491:X.509 1379:Kyber 1343:ECIES 1257:JN-25 1246:TypeX 1206:3-Way 1120:Shark 1071:SAFER 894:(IBC) 882:X Lai 813:DES-X 761:CAST6 743:CAST5 621:SOBER 516:ISAAC 511:HELIX 500:tunny 318:ROT13 284:Ultra 2393:and 2273:NIST 2201:RFCs 2173:NIST 1822:RTR0 1806:GOST 1703:UMAC 1676:HMAC 1636:Salt 1467:Keys 1374:EPOC 1358:ECDH 1193:XTEA 1030:NUSH 988:Mars 936:LION 824:GDES 819:FEAL 807:DEAL 789:CMEA 749:and 704:BEAR 682:and 676:NIST 638:WAKE 616:SNOW 611:SEAL 532:MUGI 483:Pike 455:FISH 445:BMGL 435:A5/2 431:A5/1 251:and 123:Code 47:(or 2416:RSA 2378:PGP 2256:NBS 1734:NSA 1720:MD5 1692:RFC 1461:XTR 1405:RSA 1150:TEA 1142:AES 1128:AES 1060:RC5 1048:RC6 1042:RC2 977:DES 973:NBS 969:NSA 965:IBM 963:of 886:ETH 884:of 828:DES 581:RC4 567:MIT 563:RC4 502:by 476:by 439:GSM 2685:: 2551:. 2350:- 1686:, 1364:, 1236:, 1097:, 1093:, 686:; 585:IV 569:; 544:- 79:. 71:, 59:, 2592:e 2585:t 2578:v 2561:. 1916:; 1798:. 1140:/ 1126:/ 1036:Q 971:/ 759:( 741:( 96:/ 20:)

Index

Topics in cryptography
Index of cryptography articles
outline
Cryptography
information
mathematics
computer science
engineering
ATM cards
computer passwords
electronic commerce
Cryptographer
Encryption
decryption
Cryptographic key
Cipher
Ciphertext
Plaintext
Code
Tabula recta
Alice and Bob
Commitment schemes
Secure multiparty computation
Electronic voting
Authentication
Digital signatures
Crypto systems
Dining cryptographers problem
Anonymous remailer
Pseudonymity

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑