List of cryptography topics

From Example Problems
Jump to navigation Jump to search

Template:Portalpar

This page aims to alphabetically list articles that are primarily related to cryptography. There is a categorised and (somewhat) annotated list of the same articles in subject groupings at Topics in cryptography; it will probably be more useful to those attempting to make some sense of the field. This page is intended to be useful to those monitoring Wikipedia's coverage of the subject (e.g. for editing or maintenance purposes) by providing an easy way to track changes in the indexed articles by clicking on "Related changes" in the sidebar or the link below:

This list does not necessarily include all cryptography-related articles in the Wikipedia, though there is a concerted effort to keep it so. Nevertheless, if you see an article that should be here, but isn't (or one that shouldn't be here but is), please do update the list accordingly.

Note: this page is also being made somewhat redundant by the new category system. See Category:Cryptography and its subcategories.

See also

Template:CompactTOC

Digits and symbols

3-Way -- 40-bit encryption -- 5-UCO --

A

A5/1 -- A5/2 -- Abraham Sinkov -- ABA digital signature guidelines -- Acoustic cryptanalysis -- Adaptive chosen-ciphertext attack -- Adaptive chosen plaintext and chosen ciphertext attack -- ADFGVX cipher -- Adi Shamir -- Advanced Access Content System -- Advanced Encryption Standard -- Advanced Encryption Standard process -- Adversary -- AEAD block cipher modes of operation -- Affine cipher -- Agnes Meyer Driscoll -- AKA (security) -- Akelarre (cipher) -- Alastair Denniston -- Al Bhed -- Alan Turing -- Alice and Bob -- AN/CYZ-10 -- Anonymous publication -- Anonymous remailer -- Antoni Palluth -- Arlington Hall -- Arne Beurling -- Arthur Scherbius -- Arvid Gerhard Damm -- Asymmetric key algorithm -- Atbash -- Auguste Kerckhoffs -- Authenticated encryption -- Authentication -- Authorization certificate -- Autokey cipher -- Avalanche effect -- AxCrypt --

B

Babington Plot -- Baby-step giant-step -- Banburismus -- Bart Preneel -- BATON -- Bazeries cylinder -- Beale ciphers -- Bernstein v. United States -- BID 770 -- Bifid cipher -- Birthday attack -- Bit-flipping attack -- Biuro Szyfrów -- Black Chamber -- Blaise de Vigenère -- Bletchley Park -- Blind credential -- Blinding (cryptography) -- Blind signature -- Block cipher -- Block cipher modes of operation -- Block size (cryptography) -- Blowfish (cipher) -- Blum Blum Shub -- Bomba (cryptography) -- Bombe -- Book cipher -- Books on cryptography -- Boomerang attack -- Boris Hagelin -- Broadcast encryption -- Bruce Schneier -- Brute force attack -- Burrows-Abadi-Needham logic --

C

Caesar cipher -- CAcert -- Cardan grille -- CAST-128 -- CAST-256 -- Camellia (cipher) -- Cayley-Purser algorithm -- CCM mode -- CCMP -- C-52 -- CD-57 -- Central Security Service -- Cellular Message Encryption Algorithm -- Centre for Applied Cryptographic Research -- Certificate authority -- Certificate-based encryption -- Certificateless cryptography -- Certificate revocation list -- Certificate signing request -- Certification path validation algorithm -- Certicom -- Chaffing and winnowing -- Challenge-response test -- Challenge-response authentication -- Chosen-ciphertext attack -- Chosen-plaintext attack -- CipherSaber -- Cipherspace -- Ciphertext indistinguishability -- Ciphertext-only attack -- Ciphertext stealing -- Claude Elwood Shannon -- Cleartext -- Classical cipher -- Clifford Cocks -- Clipper chip -- CMVP -- Code (cryptography) -- Codebook -- Code talker -- Codress message -- Colossus computer -- Collision attack -- Commitment scheme -- Common Scrambling Algorithm -- Communications security -- Communications Security Establishment -- Communication Theory of Secrecy Systems -- Computational Diffie-Hellman assumption -- Computer insecurity -- Computer surveillance -- COMSEC equipment -- Concrete security -- Conel Hugh O'Donel Alexander -- Confidentiality -- Confusion and diffusion -- Content-scrambling system -- Cover (telecommunications) -- Covert channel -- Crib (cryptanalysis) -- CrossCrypt -- Cramer-Shoup system -- Cryptanalysis -- Cryptanalysis of the Enigma -- Cryptanalytic computer -- Cryptex -- CRYPTO -- Crypto AG -- CryptoAPI -- Crypto API -- Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age -- Crypto-anarchism -- CryptoBuddy -- Cryptochannel -- Cryptogram -- Cryptographic engineering -- Cryptographic hash function -- Cryptographic Message Syntax -- Cryptographic protocol -- Cryptographically secure pseudo-random number generator -- Cryptographically strong -- Cryptographie indéchiffrable -- Cryptography -- Cryptography in Japan -- Cryptography newsgroups -- Cryptography standards -- Cryptologia -- Cryptology ePrint Archive -- Cryptomathic -- Cryptome -- Cryptonomicon -- CryptoStick -- Crypto-society -- Cryptosystem -- CRYPTREC -- CS-Cipher -- Cyclometer -- Cypherpunk --

D

Daniel J. Bernstein -- Data Encryption Standard -- Datagram Transport Layer Security -- David Chaum -- David Kahn -- David Wagner -- David Wheeler -- Davies-Meyer construction -- DEAL -- Decipherment -- Decrypt -- DeCSS -- Decisional Diffie-Hellman assumption -- Defence Signals Directorate -- Delegated Path Discovery -- Delegated Path Validation -- Deniable encryption -- Derek Taunt -- DES-X -- DES supplementary material -- Deterministic encryption -- Dictionary attack -- Differential cryptanalysis -- Differential-linear attack -- Differential power analysis -- Diffie-Hellman key exchange -- DigiCipher 2 -- Digital Fortress -- Digital rights management -- Digital signature -- Digital Signature Algorithm -- Digital timestamping -- Dilly Knox -- Dining cryptographers protocol -- Diplomatic bag -- Direct anonymous attestation -- Discrete logarithm -- Disk encryption -- Distributed.net -- Dmitry Sklyarov -- DomainKeys -- Don Coppersmith -- Dorabella Cipher -- DRYAD --

E

E0 (cipher) -- EAP-SIM -- ECHELON -- ECRYPT -- Edward Hebern -- Edward Travis -- EFF DES cracker -- EFS -- EKMS -- Electronic money -- Electronic signature -- Electronic voting -- ElGamal encryption -- ElGamal signature scheme -- Eli Biham -- Elizebeth Friedman -- Elliptic curve cryptography -- Elliptic Curve DSA -- Encrypted function -- Encrypted key exchange -- Encrypting File System -- Encryption -- Encryption software -- Enigma machine -- Enigma rotor details -- Enigmail -- Entrust -- eSTREAM -- Étienne Bazeries -- Existential forgery -- Export of cryptography -- Extensible Authentication Protocol --

F

FEAL -- Feistel cipher -- Felix Delastelle -- Fialka -- Financial cryptography -- FIPS 140 -- FIREFLY -- FISH (cipher) -- Fish (cryptography) -- Fortezza -- Fortuna (PRNG) -- Four-square cipher -- FOX (cipher) -- Fractal cryptography -- Frank A. Stevenson -- Frank Rowlett -- FreeS/WAN -- Frequency analysis -- Friedrich Kasiski -- Fritz-chip -- FROG -- Full Domain Hash -- F. W. Winterbotham --

G

Garble -- Gardening (cryptanalysis) -- GDES -- George Scovell -- Gilbert Vernam -- GMR (cryptography) -- GNU Privacy Guard -- GnuTLS -- Gordon Welchman -- Goldwasser-Micali cryptosystem -- GOST 28147-89 -- Gost-Hash -- Government Communications Headquarters -- Government Communications Security Bureau -- Grain (cipher) -- Great Cipher -- Gustave Bertrand -- Gwido Langer --

H

H.235 -- Hans-Thilo Schmidt -- Hard-core predicate -- Hardware random number generator -- Harold Keen -- Harry Hinsley -- Harvest (computer) -- HAS-160 -- Hashcash -- Hash list -- Hash tree -- HAVAL -- HC-9 -- Hebern rotor machine -- Henryk Zygalski -- Herbert Yardley -- High-Bandwidth Digital Content Protection -- Hill cipher -- History of cryptography -- HMAC -- Horst Feistel -- Https -- Hugo Hadwiger -- Hugo Koch -- Hushmail -- Hut 8 -- Hyperelliptic curve cryptography -- HX-63 --

I

Ian Goldberg -- IBM 4758 -- ICE (cipher) -- ID-based cryptography -- Identification friend or foe -- IEEE 802.11i -- IEEE P1363 -- I. J. Good -- Illegal prime -- Index of coincidence -- Indifferent chosen-ciphertext attack -- Information security -- Information theoretic security -- Initialization vector -- Integer factorization -- International Association for Cryptologic Research -- Information leakage -- Interlock Protocol -- International Data Encryption Algorithm -- Internet key exchange -- Internet Security Association and Key Management Protocol -- Invisible ink -- IPsec -- Iraqi block cipher -- ISAAC (cipher) --

J

JADE -- James Ellis -- Jan Graliński -- Jan Kowalewski -- Java Cryptography Architecture -- Jefferson disk -- Jerzy Różycki -- JN-25 -- Joan Daemen -- Johannes Trithemius -- John Tiltman -- Joseph Rochefort -- Joseph Mauborgne -- Josef Pieprzyk -- Journal of Cryptology --

K

Kasiski examination -- KASUMI -- KCDSA -- Kerberos (protocol) -- Kerckhoffs' law -- Key-agreement protocol -- Key authentication -- Key (cryptography) -- Key derivation function -- Key distribution center -- Key escrow -- Key exchange -- Key generation -- Key management -- Key schedule -- Key server (cryptographic) -- Key signing party -- Key size -- KG-84 -- KHAZAD -- Khufu and Khafre -- Kiss (cryptanalysis) -- KL-7 -- Knapsack problem -- Known-plaintext attack -- KOV-14 -- Kryha -- Kryptos -- KSD-64 -- KW-26 -- KW-37 -- KY-57 -- KY-58 --

L

Lacida -- Lars Knudsen -- Laurance Safford -- LEAP (encryption) -- Le chiffre indéchiffrable -- Leo Marks -- Leonard Adleman -- Leone Battista Alberti -- Leo Rosen -- LibTom Project -- Linear cryptanalysis -- Linear feedback shift register -- Link encryption -- List of cryptographers -- List of cryptographic key types -- List of cryptography topics -- List of famous ciphertexts -- List of telecommunications encryption terms -- LOKI -- LOKI97 -- Lorenz SZ 40/42 -- Louis W. Tordella -- Lucifer (cipher) --

M

M-94 -- M-209 -- M-325 -- MacGuffin (cipher) -- Madryga -- MAGENTA -- Magic (cryptography) -- Malcolm J. Williamson -- Malleability (cryptography) -- Man in the middle attack -- Marian Rejewski -- MARS -- MaruTukku -- Martin Hellman -- Massey-Omura cryptosystem -- Matt Blaze -- Max Newman -- Maksymilian Ciężki -- McEliece cryptosystem -- MCrypt -- MD2 -- MD4 -- MD5 -- MD5CRK -- Mean Shortest Distance -- Meet-in-the-middle attack -- Merkle-Hellman -- Mental poker -- Merkle's Puzzles -- Message authentication code -- Message forgery -- MI8 -- Microdot -- Mimic function -- Mirror writing -- MISTY1 -- Mitsuru Matsui -- Miyaguchi-Preneel scheme -- MMB -- Mod n cryptanalysis -- MQV -- MUGI -- MULTI-S01 --

N

National Security Agency -- National Cryptologic Museum -- Needham-Schroeder -- Negligible function (cryptography) -- NEMA (machine) -- NESSIE -- Neal Koblitz -- NewDES --

N-Hash -- Nicolas Courtois -- Niels Ferguson -- NLFSR -- Nothing up my sleeve number -- NSA encryption algorithms -- NSA encryption systems -- NSAKEY -- NSA Suite B -- NTLM -- NTRUEncrypt -- Null cipher -- Numbers station --

O

Oblivious transfer -- OCB mode -- Off-the-record messaging -- Omni (SCIP) -- One-key MAC -- One-time pad -- One-time password -- One-way function -- Online Certificate Status Protocol -- OP-20-G -- OpenSSH -- OpenSSL -- Openswan -- Optimal Asymmetric Encryption Padding -- OTFE -- Otway-Rees --

P

Padding (cryptography) -- Paillier cryptosystem -- Passive attack -- Passphrase -- Password -- Password-authenticated key agreement -- Password cracking -- Paul Kocher -- PBKDF2 -- PC Bruno -- Perfect forward secrecy -- Perforated sheets -- Permutation cipher -- Peter Gutmann -- Peter Twinn -- Phelix -- Phil Zimmermann -- Photuris (protocol) -- Physical security -- Pigpen cipher -- Pike (cipher) -- Piling-up lemma -- Pinwheel (cryptography) -- Piotr Smoleński -- PKCS -- PKIX -- Plaintext -- Playfair cipher -- PMAC -- Poem code -- Point-to-point tunneling protocol -- Poly1305-AES -- Polyalphabetic cipher -- Polybius square -- Power analysis -- Pretty Good Privacy -- Preimage attack -- Privacy-enhanced Electronic Mail -- Private information retrieval -- Probabilistic encryption -- Product cipher -- Proof-of-work system -- Protected Extensible Authentication Protocol -- Provable security -- Proxy re-encryption -- Pseudo-Hadamard transform -- Pseudonymity -- Pseudorandom number generator -- Public key certificate -- Public-key cryptography -- Public key infrastructure -- PURPLE -- PuTTY --

Q

Quadratic sieve -- Quantum cryptography -- Quantum fingerprinting --

R

Rabin cryptosystem -- Ralph Merkle -- Random number generator attack -- Random oracle -- RC2 -- RC4 -- RC5 -- RC6 -- RED/BLACK concept -- REDOC -- Red Pike -- Regulation of Investigatory Powers Act 2000 -- Reihenschieber -- Related-key attack -- Replay attack -- Residual block termination -- RIPEMD -- Robert Morris (cryptographer) -- Ron Rivest -- Room 40 -- Root certificate -- Ross Anderson -- ROT13 -- Rotor machine -- RSA -- RSA-100 -- RSA-110 -- RSA-120 -- RSA-129 -- RSA-130 -- RSA-140 -- RSA-150 -- RSA-155 -- RSA-160 -- RSA-170 -- RSA-180 -- RSA-190 -- RSA-200 -- RSA-210 -- RSA-220 -- RSA-230 -- RSA-232 -- RSA-240 -- RSA-250 -- RSA-260 -- RSA-270 -- RSA-280 -- RSA-290 -- RSA-300 -- RSA-309 -- RSA-310 -- RSA-320 -- RSA-330 -- RSA-340 -- RSA-350 -- RSA-360 -- RSA-370 -- RSA-380 -- RSA-390 -- RSA-400 -- RSA-410 -- RSA-420 -- RSA-430 -- RSA-440 -- RSA-450 -- RSA-460 -- RSA-470 -- RSA-480 -- RSA-490 -- RSA-500 -- RSA-576 -- RSA-617 -- RSA-640 -- RSA-704 -- RSA-768 -- RSA-896 -- RSA-1024 -- RSA-1536 -- RSA-2048 -- RSA Factoring Challenge -- RSA problem -- RSA Security -- Rubber-hose cryptanalysis -- Running key cipher -- Russian copulation --

S

S-1 -- SAFER -- Salt (cryptography) -- Salsa20 -- SAM card -- SAML -- SAVILLE -- Schnorr group -- Schnorr signature -- SCIP -- Scott Vanstone -- Scrambler -- Scytale -- SEAL (cipher) -- SECG -- Secret broadcast -- Secret decoder ring -- Secrets and Lies -- Secret sharing -- Sectéra Secure Module -- Secure channel -- Secure Communication based on Quantum Cryptography -- Secure copy -- Secure cryptoprocessor -- Secure electronic transaction -- Secure FTP -- Secure key issuing cryptography -- SecureIM -- Secure multiparty computation -- Secure remote password protocol -- Secure Shell -- Secure telephone -- Secure Terminal Equipment -- Secure voice -- SecurID -- Security engineering -- Security parameter -- Security protocol notation -- Security through obscurity -- Security token -- SEED -- Self-certifying key -- Self-shrinking generator -- Self-signed certificate -- Semantic security -- Serge Vaudenay -- Serpent (cipher) -- Session key -- SHACAL -- SHA hash functions -- Shafi Goldwasser -- SHARK -- Shrinking generator -- Shugborough House inscription -- Side channel attack -- Siemens and Halske T52 -- SIGABA -- SIGINT -- Signals Intelligence Service -- Signlet -- SIGSALY -- SILC (protocol) -- Silvio Micali -- Simple public key infrastructure -- Simple XOR cipher -- Skipjack (cipher) -- S/KEY -- Slide attack -- Small subgroup confinement attack -- S/MIME -- Snake oil (cryptography) -- Snefru -- Snuffle -- SOBER-128 -- Solitaire (cipher) -- Solomon Kullback -- SPEKE (cryptography) -- Square (cipher) -- SSH file transfer protocol -- Ståle Schumacher Ytteborg -- Stefan Lucks -- Steganalysis -- Steganography -- Straddling checkerboard -- Stream cipher -- Stream cipher attack -- Strict avalanche criterion -- Strong RSA assumption -- STU-III -- Stunnel -- StunTour -- Substitution box -- Substitution cipher -- Substitution-permutation network -- Superencryption -- Swedish National Defence Radio Establishment -- Symmetric key algorithm -- SYSKEY --

T

Tabula recta -- Taher Elgamal -- Tamper resistance -- TEMPEST -- Thawte -- The Alphabet Cipher -- The Codebreakers -- The Code Book -- The Gold Bug -- The Magic Words are Squeamish Ossifrage -- TICOM -- Tiger (hash) -- Tiger-Tree Hash -- Timeline of cryptography -- Timing attack -- Tiny Encryption Algorithm -- TKIP -- Tommy Flowers -- Topics in cryptography -- Torus-based cryptography -- Traffic analysis -- Traffic-flow security -- Transmission security -- Transport Layer Security -- Transposition cipher -- Trapdoor function -- Trench code -- Trifid cipher -- Triple DES -- Trivium (cipher) -- TrueCrypt -- Trusted third party -- Turing (cipher) -- TWINKLE -- TWIRL -- Twofish -- Two-square cipher -- Type 1 encryption -- Type 2 encryption -- Type 3 encryption -- Type 4 encryption -- Typex --

U

Ultra -- Undeniable signature -- UMAC -- Unicity distance --

V

VENONA project -- VEST -- VeriSign -- VIC cipher -- Vigenère cipher -- Vincent Rijmen -- VINSON -- Virtual private network -- Visual cryptography -- Voynich manuscript --

W

WAKE -- WAPI -- Weak key -- Web of trust -- Whitfield Diffie -- WHIRLPOOL -- Wide Mouth Frog -- Wi-Fi Protected Access -- William F. Friedman -- W. T. Tutte -- WinSCP -- Wired Equivalent Privacy -- World War II cryptography -- WTLS --

X

X.509 -- XDH Assumption -- Xiaoyun Wang -- XML Signature -- XSL attack -- XTEA --

Y

Yarrow algorithm -- Yuliang Zheng --

Z

Zero-knowledge password proof -- Zero-knowledge proof -- Zeroisation -- Zimmermann Telegram -- Zimmermann-Sassaman key-signing protocol --