Index of cryptography articles

Articles related to cryptography include:

Contents :

0-9

3-D Secure3-Way40-bit encryption56-bit encryption5-UCO

A

A5/1A5/2ABA digital signature guidelinesABC (stream cipher)Abraham SinkovAcoustic cryptanalysisAdaptive chosen-ciphertext attackAdaptive chosen plaintext and chosen ciphertext attackAdvantage (cryptography)ADFGVX cipherAdi ShamirAdvanced Access Content SystemAdvanced Encryption StandardAdvanced Encryption Standard processAdversaryAEAD block cipher modes of operationAffine cipherAgnes Meyer DriscollAKA (security)Akelarre (cipher)Alan TuringAlastair DennistonAl Bhed languageAlex BiryukovAlfred MenezesAlgebraic EraserAlice and BobAll-or-nothing transformAlphabetum KaldeorumAlternating step generatorAmerican Cryptogram AssociationAN/CYZ-10Anonymous internet bankingAnonymous publicationAnonymous remailerAntoni PalluthAnubis (cipher)ARIA (cipher)Arlington HallArne BeurlingArnold CipherArthur ScherbiusArvid Gerhard DammAsiacryptAtbashAttack modelAuguste KerckhoffsAuthenticated encryptionAuthenticationAuthorization certificateAutokey cipherAvalanche effect

B

B-DienstBabington PlotBaby-step giant-stepBacon's cipherBanburismusBart PreneelBaseKingBassOmaticBATONBB84Beale ciphersBeaufort cipherBeaumanor HallBent functionBerlekamp–Massey algorithmBernstein v. United StatesBestCryptBID/60BID 770Bifid cipherBill WeisbandBiometric word listBirthday attackBit-flipping attackBitTorrent protocol encryptionBiuro SzyfrówBlack ChamberBlaise de VigenèreBletchley ParkBlind credentialBlinding (cryptography)Blind signatureBlock cipherBlock cipher modes of operationBlock size (cryptography)Blowfish (cipher)Blum Blum ShubBlum–Goldwasser cryptosystemBomba (cryptography)BombeBook cipherBooks on cryptographyBoomerang attackBoris HagelinBouncy castle (cryptography)Broadcast encryptionBruce SchneierBrute force attackBrute Force: Cracking the Data Encryption StandardBurrows–Abadi–Needham logicBurt Kaliski

C

C2NetC-36 (cipher machine)C-52 (cipher machine)CAcert.orgCaesar cipherCamellia (cipher)CAPICOMCapstone (cryptography)Cardan grilleCard catalog (cryptology)Carlisle AdamsCAST-128CAST-256Cayley–Purser algorithmCBC-MACCCM modeCCMPCD-57CDMFCellular Message Encryption AlgorithmCentibanCentral Security ServiceCentre for Applied Cryptographic ResearchCentral BureauCerticomCertificate authorityCertificate-based encryptionCertificateless cryptographyCertificate revocation listCertificate signing requestCertification path validation algorithmChaffing and winnowingChallenge-handshake authentication protocolChallenge-response authenticationCHESChosen-ciphertext attackChosen-plaintext attackCIKS-1Cipher diskCipher runesCipher security summaryCipherSaberCiphertext expansionCiphertext indistinguishabilityCiphertext-only attackCiphertext stealingCIPHERUNICORN-ACIPHERUNICORN-EClassical cipherClaude Elwood ShannonClaw-free permutationCleartextCLEFIAClifford CocksClipper chipClock (cryptography)Clock driftCMVPCOCONUT98CodebookCode (cryptography)Code talkerCodress messageCold boot attackCollision attackCollision resistanceColossus computerCombined Cipher MachineCommitment schemeCommon Scrambling AlgorithmCommunications securityCommunications Security EstablishmentCommunication Theory of Secrecy SystemsComparison of disk encryption softwareComparison of SSH clientsCompleteness (cryptography)Complexity trapComputational Diffie–Hellman assumptionComputational hardness assumptionComputer insecurityComputer surveillanceCOMSEC equipmentConch (SSH)Concrete securityConel Hugh O'Donel AlexanderConfidentialityConfusion and diffusionContent-scrambling systemControlled Cryptographic ItemCorkscrew (program)Correlation immunityCovert channelCover (telecommunications)Crab (cipher)Cramer–Shoup cryptosystemCRAM-MD5CRHFCrib (cryptanalysis)CrossCryptCrowdsCryptanalysisCryptanalysis of the EnigmaCryptanalysis of the Lorenz cipherCryptanalytic computerCryptexCrypticoCrypto AGCrypto-anarchismCrypto API (Linux)Microsoft CryptoAPICryptoBuddyCryptochannelCRYPTO (conference)CryptogramCryptographically Generated AddressesCryptographically secure pseudorandom number generatorCryptographically strongCryptographic Application Programming InterfaceCryptographic engineeringCryptographic hash functionCryptographic key typesCryptographic Message SyntaxCryptographic primitiveCryptographic protocolCryptographic Service ProviderCryptographie indéchiffrableCryptographyCryptography in JapanCryptography newsgroupsCryptography standardsCrypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital AgeCryptologiaCryptology ePrint ArchiveCryptology Research Society of IndiaCryptomathicCryptomeCryptomeria cipherCryptonomiconCrypToolCrypto phoneCrypto-societyCryptosystemCryptovirologyCRYPTRECCS-CipherCustom hardware attackCyclometerCypherpunkCyrillic Projector

D

D'Agapeyeff cipherDaniel J. BernsteinData Authentication AlgorithmData Encryption StandardDatagram Transport Layer SecurityDavid ChaumDavid KahnDavid NaccacheDavid WagnerDavid Wheeler (computer scientist)Davies' attackDavies–Meyer hashDEALDecimal sequences for cryptographyDeciphermentDecisional Diffie–Hellman assumptionDecorrelation theoryDecryptDeCSSDefence Signals DirectorateDegree of anonymityDelegated Path DiscoveryDelegated Path ValidationDeniable encryptionDerek TauntDerived unique key per transactionDES ChallengesDES supplementary materialDES-XDeterministic encryptionDFC (cipher)Dictionary attackDifferential cryptanalysisDifferential-linear attackDifferential power analysisDiffie–Hellman key exchangeDiffie–Hellman problemDigiCipher 2Digital FortressDigital rights managementDigital signatureDigital Signature AlgorithmDigital timestampingDigital watermarkingDilly KnoxDining cryptographers problemDiplomatic bagDirect anonymous attestationDiscrete logarithmDisk encryptionDisk encryption hardwareDisk encryption softwareDistance-bounding protocolDistinguishing attackDistributed.netDMA attackdm-cryptDmitry SklyarovDomainKeysDon CoppersmithDorabella CipherDoug StinsonDragon (cipher)DRYADDvorak encoding

E

E0 (cipher)E2 (cipher)E4MEAP-AKAEAP-SIMEAX modeECC patentsECHELONECRYPTEdouard Fleissner von WostrowitzEdward HebernEdward ScheidtEdward TravisEFF DES crackerEfficient Probabilistic Public-Key Encryption SchemeEKMSElectronic Communications Act 2000Electronic moneyElectronic signatureElectronic votingElGamal encryptionElGamal signature schemeEli BihamElizebeth FriedmanElliptic curve cryptographyElliptic curve Diffie–HellmanElliptic Curve DSAElliptic curve only hashElonka DuninFilesystem-level encryptionEncrypted functionEncrypted key exchangeEncrypting File SystemEncryptionEncryption softwareEnigmailEnigma machineEnigma rotor detailsEntrustErnst FetterleineSTREAMÉtienne BazeriesEurocryptEuroCryptExistential forgeryExport of cryptographyExtensible Authentication Protocol

F

Fast Software EncryptionFast Syndrome Based HashFEA-MFEALFeistel cipherFelix DelastelleFialkaFilesystem-level encryptionFileVaultFill deviceFinancial cryptographyFIPS 140FIPS 140-2FIREFLYFirefly (protocol)FISH (cipher)Fish (cryptography)FloradoraFluhrer, Mantin and Shamir attackFortezzaFort George G. MeadeFortuna (PRNG)Four-square cipherFranciszek PokornyFrank A. StevensonFrank RowlettFreenetFreeOTFEFreeS/WANFrequency analysisFriedrich KasiskiFritz-chipFROGFROSTBURGFTP over SSHFull disk encryptionFull Domain HashF. W. Winterbotham

G

Galois/Counter ModeGarbleGardening (cryptanalysis)GCHQ CSO MorwenstowGDESGeorge BlakleyGeorge ScovellGGH encryption algorithmGGH signature schemeGilbert VernamGMR (cryptography)GNU Privacy GuardGnuTLSGoldwasser–Micali cryptosystemGordon WelchmanGOST 28147-89Gost-HashGovernment Communications HeadquartersGovernment Communications Security BureauGrain (cipher)Grand Cru (cipher)Great CipherGrill (cryptology)Grille (cryptography)Group-based cryptographyGroup signatureGrover's algorithmGustave BertrandGwido Langer

H

H.235HAIPEHans DobbertinHans-Thilo SchmidtHard-core predicateHardware random number generatorHardware Security ModuleHarold KeenHarry HinsleyHarvest (computer)HAS-160HashcashHash chainHash function security summaryHash listHAVALHC-256HC-9Heath Robinson (codebreaking machine)Hebern rotor machineHenri BraqueniéHenryk ZygalskiHerbert YardleyHidden Field EquationsHideki ImaiHierocryptHigh-Bandwidth Digital Content ProtectionHigher-order differential cryptanalysisHill cipherHistory of cryptographyHMACHorst FeistelHOTPHoward HeysHttpsHugo HadwigerHugo KochHushmailHut 6Hut 8HX-63Hyperelliptic curve cryptographyHyper-encryption

I

Ian GoldbergIBM 4758ICE (cipher)ID-based cryptographyIDEA NXTIdentification friend or foeIEEE 802.11iIEEE P1363I. J. GoodID-based cryptographyIllegal primeImpossible differential cryptanalysisIndex of coincidenceIndifferent chosen-ciphertext attackIndocryptInformation leakageInformation Security GroupInformation theoretic securityInitialization vectorInteger factorizationIntegral cryptanalysisIntegrated Encryption SchemeIntegrated Windows AuthenticationInterlock ProtocolIntermediate certificate authoritiesInternational Association for Cryptologic ResearchInternational Data Encryption AlgorithmInternet key exchangeInternet Security Association and Key Management ProtocolInterpolation attackInvisible inkIPsecIraqi block cipherISAAC (cipher)ISO 19092-2Ivan Damgård

J

Jacques SternJADE (cypher machine)James GilloglyJames H. EllisJames MasseyJan GralińskiJan KowalewskiJapanese naval codesJava Cryptography ArchitectureJefferson diskJennifer SeberryJerzy RóżyckiJoan DaemenJohannes TrithemiusJohn HerivelJohn Kelsey (cryptanalyst)John R. F. JeffreysJohn TiltmanJon Lech JohansenJosef PieprzykJoseph DeschJoseph Finnegan (cryptographer)Joseph MauborgneJoseph RochefortJournal of CryptologyJunger v. Daley

K

Kaisa NybergKasiski examinationKASUMI (block cipher)KCDSAKeePassKerberos (protocol)Kerckhoffs' principleKevin McCurley (cryptographer)Key-agreement protocolKey authenticationKey clusteringKey (cryptography)Key derivation functionKey distribution centerKey escrowKey exchangeKeyfileKey generationKey generatorKey managementKeymatKey scheduleKey server (cryptographic)Key signature (cryptography)KeysigningKey signing partyKey sizeKey space (cryptography)KeystreamKey strengtheningKey whiteningKG-84KHAZADKhufu and KhafreKiss (cryptanalysis)KL-43KL-51KL-7KleptographyKN-CipherKnapsack problemKnown-key distinguishing attackKnown-plaintext attackKnownSafeKOI-18KOV-14KryhaKryptosKSD-64KW-26KW-37KY-3KY-57KY-58KY-68KYK-13

L

LacidaLadder-DESLamport signatureLars KnudsenLattice-based cryptographyLaurance SaffordLawrie BrownLCS35Leo MarksLeonard AdlemanLeone Battista AlbertiLeo RosenLeslie YoxallLEVIATHAN (cipher)LEX (cipher)Libelle (cipher)Linear cryptanalysisLinear feedback shift registerLink encryptionList of cryptographersList of cryptographic file systemsList of cryptographic key typesList of cryptography topicsList of famous ciphertextsList of telecommunications encryption termsList of people associated with Bletchley ParkList of SFTP clientsList of SFTP server softwareLOKILOKI97Lorenz SZ 40/42Louis W. TordellaLshLucifer (cipher)

M

M6 (cipher)M8 (cipher)M-209M-325M-94MacGuffin (cipher)MadrygaMAGENTAMagic (cryptography)Maksymilian CiężkiMalcolm J. WilliamsonMalleability (cryptography)Man-in-the-middle attackMarian RejewskiMARS (cryptography)Martin HellmanMaruTukkuMassey-Omura cryptosystemMatt BlazeMatt RobshawMax NewmanMcEliece cryptosystemmcryptMD2 (cryptography)MD4MD5MD5CRKMDC-2MDS matrixMean Shortest DistanceMeet-in-the-middle attackMental pokerMercury (cipher machine)Mercy (cipher)Meredith GardnerMerkle signature schemeMerkle-Damgård constructionMerkle-Hellman knapsack cryptosystemMerkle's PuzzlesMerkle treeMESH (cipher)Message authenticationMessage authentication codeMessage forgeryMessage Integrity CodeMI8Michael LubyMICKEY-128MicrodotMilitary Cryptanalysis (book) (William F. Friedman)Military CryptanalyticsMimic functionMirror writingMISTY1Mitsuru MatsuiMMB (cipher)Mod n cryptanalysisMQVMS-CHAPMUGIMULTI-S01MultiSwapMultivariate cryptography

N

National Communications CentreNational Cryptologic MuseumNational Security AgencyNational Cipher ChallengeNavajo INeal KoblitzNeedham–SchroederNegligible function (cryptography)NEMA (machine)NESSIENetwork Security ServicesNeural cryptographyNew Data SealNewDESN-HashNicolas CourtoisNiederreiter cryptosystemNiels FergusonNigel de GreyNihilist cipherNikita BorisovNimbus (cipher)NIST hash function competitionNLFSRNOEKEONNon-malleable codesNoreenNothing up my sleeve numberNSA cryptographyNSA encryption systemsNSA in fictionNSAKEYNSA Suite A CryptographyNSA Suite B CryptographyNTRU Cryptosystems, Inc.NTRUEncryptNTRUSignNull cipherNumbers stationNUSHNTRU

O

Oblivious transferOCB modeOded GoldreichOff-the-record messagingOkamoto–Uchiyama cryptosystemOMI cryptographOMNI (SCIP)One-key MACOne-time padOne-time passwordOne-way compression functionOne-way encryptionOne-way functionOne-way permutationOnion routingOnline Certificate Status ProtocolOP-20-GOpenPGP cardOpenSSHOpenSSLOpenswanOpenVPNOperation RuthlessOptimal Asymmetric Encryption PaddingOTAROTFEOtway–Rees

P

Padding (cryptography)Padding oracle attackPaillier cryptosystemPairing-based cryptographyPANAMAPartitioning cryptanalysisPassive attackPassphrasePasswordPassword-authenticated key agreementPassword crackingPaul KocherPaulo PancatuccioPaulo S. L. M. BarretoPaul van OorschotPBKDF2PC BrunoPerfect forward secrecyPerforated sheetsPermutation cipherPeter Gutmann (computer scientist)Peter Junger --
Peter TwinnPGP CorporationPGPDiskPGPfonePhelixPhil ZimmermannPhoturis (protocol)Physical securityPhysically Unclonable FunctionPig LatinPigpen cipherPike (cipher)Piling-up lemmaPinwheel (cryptography)Piotr SmoleńskiPirate decryptionPKC (conference)PKCSPKCS11PKCS12PKIXPlaintextPlaintext-aware encryptionPlayfair cipherPlugboardPMAC (cryptography)Poem codePohlig–Hellman algorithmPoint-to-point tunneling protocolPointcheval–Stern signature algorithm --
Poly1305-AESPolyalphabetic cipherPolybius squarePortexPost-quantum cryptographyPower analysisPreimage attackPre-shared keyPretty Good PrivacyPrinter steganographyPrivacy-enhanced Electronic MailPrivate Communications TechnologyPrivate information retrievalProbabilistic encryptionProduct cipherProof-of-work systemProtected Extensible Authentication ProtocolProvable securityProvably secure cryptographic hash functionProxy re-encryptionPseudo-Hadamard transformPseudonymityPseudorandom functionPseudorandom number generatorPublic key certificatePublic-key cryptographyPublic key fingerprintPublic key infrastructurePURPLEPuTTYPy (cipher)

Q

Q (cipher)QrpffQUAD (cipher)Quadratic sieveQuantum cryptographyQuantum digital signatureQuantum fingerprinting

R

Rabbit (cipher)Rabin cryptosystemRabin–Williams encryptionRail Fence CipherRainbow tableRalph MerkleRambutan (cryptography)Random functionRandom number generator attackRandom oracleRC2RC4RC5RC6Reciprocal cipherRED/BLACK conceptREDOCRed Pike (cipher)Reflector (cipher machine)Regulation of Investigatory Powers Act 2000ReihenschieberRekeyingRelated-key attackReplay attackReservehandverfahrenResidual block terminationRijndael key scheduleRijndael S-boxRing signatureRIPEMDRip van Winkle cipherRobert Morris (cryptographer)Robot certificate authorityRockexRolf NoskwithRon RivestRoom 40Root certificateRoss J. AndersonRossignolsROT13Rotor machineRSARSA-100RSA-1024RSA-110RSA-120RSA-129RSA-130RSA-140RSA-150RSA-1536RSA-155RSA-160RSA-170RSA-180RSA-190RSA-200RSA-2048RSA-210RSA-220RSA-230RSA-232RSA-240RSA-250RSA-260RSA-270RSA-280RSA-290RSA-300RSA-309RSA-310RSA-320RSA-330RSA-340RSA-350RSA-360RSA-370RSA-380RSA-390RSA-400RSA-410RSA-420RSA-430RSA-440RSA-450RSA-460RSA-470RSA-480RSA-490RSA-500RSA-576RSA-617RSA-640RSA-704RSA-768RSA-896RSA-PSSRSA Factoring ChallengeRSA problemRSA Secret-Key ChallengeRSA SecurityRubber-hose cryptanalysisRunning key cipherRussian copulation

S

S-1 block cipherSAFERSalsa20Salt (cryptography)SAM cardSAMLSAVILLESC2000Schnorr groupSchnorr signatureSchoof–Elkies–Atkin algorithmSCIPScott VanstoneScramblerScramdiskScream (cipher)ScytaleSeahorse (software)SEAL (cipher)Sean Murphy (cryptographer)SECGSecret broadcastSecret decoder ringSecrets and Lies (Schneier)Secret sharingSectéra Secure ModuleSecure Access ModuleSecure channelSecure Communication based on Quantum CryptographySecure copySecure cryptoprocessorSecure electronic transactionSecure Hash AlgorithmSecure hypertext transfer protocolSecure key issuing cryptographySecure multiparty computationSecure Neighbor Discovery ProtocolSecure Real-time Transport ProtocolSecure remote password protocolSecure ShellSecure telephoneSecure Terminal EquipmentSecure voiceSecurIDSecurity associationSecurity engineeringSecurity parameterSecurity protocol notationSecurity through obscuritySecurity tokenSEEDSelected Areas in CryptographySelf-certifying File SystemSelf-certifying keySelf-shrinking generatorSelf-signed certificateSemantic securitySerge VaudenaySerpent (cipher)Session keySHACALShafi GoldwasserSHA-1SHA-2Shared secretSHARKShaun WylieShor's algorithmShrinking generatorShugborough House inscriptionSide channel attackSiemens and Halske T52SIGABASIGCUMSIGINTSignals Intelligence ServiceSigncryptionSIGSALYSILC (protocol)Silvio MicaliSimple Authentication and Security LayerSimple public key infrastructureSimple XOR cipherS/KEYSkipjack (cipher)Slide attackSlidexSmall subgroup confinement attackS/MIMESMS4Snake oil (cryptography)SnefruSNOWSnuffleSOBER-128Solitaire (cipher)Solomon KullbackSOSEMANUKSpecial Collection ServiceSpectr-H64SPEKE (cryptography)Square (cipher)Ssh-agentSSH file transfer protocolSSLeayStafford TavaresStåle Schumacher YtteborgStation CASTStation HYPOStation-to-Station protocolStatistical cryptanalysisStefan LucksSteganalysisSteganographyStraddling checkerboardStream cipherStream cipher attackStrong cryptographyStrong RSA assumptionStuart Milner-BarrySTU-IISTU-IIIStunnelSubstitution boxSubstitution cipherSubstitution-permutation networkSuperencryptionSwedish National Defence Radio EstablishmentSWIFFTSXAL/MBALSymmetric-key algorithmSYSKEY

T

Tabula rectaTaher ElgamalTamper resistanceTcpcryptTelevision encryptionTEMPEST • Template:Cryptographic software • Temporal Key Integrity ProtocolTesteryThawteThe Alphabet CipherThe Code BookThe CodebreakersThe Gold BugThe Magic Words are Squeamish OssifrageTheory of Cryptography ConferenceThe world wondersThomas JakobsenThree-pass protocolThreshold shadow schemeTICOMTiger (cryptography)Timeline of cryptographyTiming attackTiny Encryption AlgorithmTom BersonTommy FlowersTopics in cryptographyTor (anonymity network)Torus-based cryptographyTraffic analysisTraffic-flow securityTraitor tracingTransmission securityTransport Layer SecurityTransposition cipherTrapdoor functionTrench codeTreyferTrifid cipherTriple DESTrivium (cipher)TrueCryptTruncated differential cryptanalysisTrusted third partyTuring (cipher)TWINKLETWIRLTwofishTwo-square cipherType 1 encryptionType 2 encryptionType 3 encryptionType 4 encryptionTypex

U

UES (cipher)UltraUMACUnbalanced Oil and VinegarUndeniable signatureUnicity distanceUniversal composabilityUOWHF

V

Venona projectVerifiable secret sharingVeriSignVery smooth hashVESTVIC cipherVideoCryptVigenère cipherVincent RijmenVINSONVirtual private networkVisual cryptographyVoynich manuscript

W

Wadsworth's cipherWAKEWLAN Authentication and Privacy InfrastructureWatermark (data file)Watermarking attackWeak keyWeb of trustWHIRLPOOLWhitfield DiffieWide Mouth FrogWi-Fi Protected AccessWilliam F. FriedmanWilliam Montgomery (cryptographer)WinSCPWired Equivalent PrivacyWireless Transport Layer SecurityWitness-indistinguishable proofWorld War I cryptographyWorld War II cryptographyW. T. Tutte

X

X.509XDH AssumptionXenon (cipher)Xiaoyun WangXML EncryptionXML SignaturexmxXSL attackXTEAXTRXuejia LaiXXTEA

Y

Yarrow algorithmY-stationsYuliang Zheng

Z

ZeroisationZero-knowledge password proofZero-knowledge proofZfoneZodiac (cipher)ZRTPZimmermann–Sassaman key-signing protocolZimmermann Telegram

See also

This article is issued from Wikipedia - version of the Tuesday, February 09, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.