Articles related to cryptography include:
A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis • Adaptive chosen-ciphertext attack • Adaptive chosen plaintext and chosen ciphertext attack • Advantage (cryptography) • ADFGVX cipher • Adi Shamir • Advanced Access Content System • Advanced Encryption Standard • Advanced Encryption Standard process • Adversary • AEAD block cipher modes of operation • Affine cipher • Agnes Meyer Driscoll • AKA (security) • Akelarre (cipher) • Alan Turing • Alastair Denniston • Al Bhed language • Alex Biryukov • Alfred Menezes • Algebraic Eraser • Algorithmically random sequence • Alice and Bob • All-or-nothing transform • Alphabetum Kaldeorum • Alternating step generator • American Cryptogram Association • AN/CYZ-10 • Anonymous publication • Anonymous remailer • Antoni Palluth • Anubis (cipher) • Argon2 • ARIA (cipher) • Arlington Hall • Arne Beurling • Arnold Cipher • Array controller based encryption • Arthur Scherbius • Arvid Gerhard Damm • Asiacrypt • Atbash • Attribute-based encryption • Attack model • Auguste Kerckhoffs • Authenticated encryption • Authentication • Authorization certificate • Autokey cipher • Avalanche effect
B-Dienst • Babington Plot • Baby-step giant-step • Bacon's cipher • Banburismus • Bart Preneel • BaseKing • BassOmatic • BATON • BB84 • Beale ciphers • BEAR and LION ciphers • Beaufort cipher • Beaumanor Hall • Bent function • Berlekamp–Massey algorithm • Bernstein v. United States • BestCrypt • Biclique attack • BID/60 • BID 770 • Bifid cipher • Bill Weisband • Binary Goppa code • Biometric word list • Birthday attack • Bit-flipping attack • BitTorrent protocol encryption • Biuro Szyfrów • Black Chamber • Blaise de Vigenère • Bletchley Park • Blind credential • Blinding (cryptography) • Blind signature • Block cipher • Block cipher mode of operation • Block size (cryptography) • Blowfish (cipher) • Blum Blum Shub • Blum–Goldwasser cryptosystem • Bomba (cryptography) • Bombe • Book cipher • Books on cryptography • Boomerang attack • Boris Hagelin • Bouncy Castle (cryptography) • Broadcast encryption • Bruce Schneier • Brute-force attack • Brute Force: Cracking the Data Encryption Standard • Burrows–Abadi–Needham logic • Burt Kaliski
C2Net • C-36 (cipher machine) • C-52 (cipher machine) • Caesar cipher • Camellia (cipher) • CAPICOM • Capstone (cryptography) • Cardan grille • Card catalog (cryptology) • Carlisle Adams • CAST-128 • CAST-256 • Cayley–Purser algorithm • CBC-MAC • CCM mode • CCMP • CD-57 • CDMF • Cellular Message Encryption Algorithm • Centiban • Central Security Service • Centre for Applied Cryptographic Research • Central Bureau • Certicom • Certificate authority • Certificate-based encryption • Certificateless cryptography • Certificate revocation list • Certificate signing request • Certification path validation algorithm • Chaffing and winnowing • Challenge-Handshake Authentication Protocol • Challenge–response authentication • Chosen-ciphertext attack • Chosen-plaintext attack • CIKS-1 • Cipher disk • Cipher runes • Cipher security summary • CipherSaber • Ciphertext expansion • Ciphertext indistinguishability • Ciphertext-only attack • Ciphertext stealing • CIPHERUNICORN-A • CIPHERUNICORN-E • Classical cipher • Claude Shannon • Claw-free permutation • Cleartext • CLEFIA • Clifford Cocks • Clipper chip • Clock (cryptography) • Clock drift • CMVP • COCONUT98 • Codebook • Code (cryptography) • Code talker • Codress message • Cold boot attack • Collision attack • Collision resistance • Colossus computer • Combined Cipher Machine • Commitment scheme • Common Scrambling Algorithm • Communications security • Communications Security Establishment • Communication Theory of Secrecy Systems • Comparison of disk encryption software • Comparison of SSH clients • Completeness (cryptography) • Complexity trap • Computational Diffie–Hellman assumption • Computational hardness assumption • Computer insecurity • Computer and network surveillance • COMSEC equipment • Conch (SSH) • Concrete security • Conel Hugh O'Donel Alexander • Confidentiality • Confusion and diffusion • Content-scrambling system • Controlled Cryptographic Item • Corkscrew (program) • Correlation immunity • COSIC • Covert channel • Cover (telecommunications) • Crab (cipher) • Cramer–Shoup cryptosystem • CRAM-MD5 • CRHF • Crib (cryptanalysis) • CrossCrypt • Crowds (anonymity network) • Crypt (C) • Cryptanalysis • Cryptanalysis of the Enigma • Cryptanalysis of the Lorenz cipher • Cryptanalytic computer • Cryptex • Cryptico • Crypto AG • Crypto-anarchism • Crypto API (Linux) • Microsoft CryptoAPI • CryptoBuddy • Cryptochannel • CRYPTO (conference) • Cryptogram • Cryptographically Generated Address • Cryptographically secure pseudorandom number generator • Cryptographically strong • Cryptographic Application Programming Interface • Cryptographic hash function • Cryptographic key types • Cryptographic Message Syntax • Cryptographic primitive • Cryptographic protocol • Cryptographic Service Provider • Cryptographie indéchiffrable • Cryptography • Cryptography in Japan • Cryptography newsgroups • Cryptography standards • Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age • Cryptologia • Cryptology ePrint Archive • Cryptology Research Society of India • Cryptomathic • Cryptome • Cryptomeria cipher • Cryptonomicon • CrypTool • Crypto phone • Crypto-society • Cryptosystem • Cryptovirology • CRYPTREC • CS-Cipher • Curve25519 • Curve448 • Custom hardware attack • Cycles per byte • Cyclometer • Cypherpunk • Cyrillic Projector
D'Agapeyeff cipher • Daniel J. Bernstein • Data Authentication Algorithm • Data Encryption Standard • Datagram Transport Layer Security • David Chaum • David Kahn • David Naccache • David Wagner • David Wheeler (computer scientist) • Davies attack • Davies–Meyer hash • DEAL • Decipherment • Decisional Diffie–Hellman assumption • Decorrelation theory • Decrypt • DeCSS • Defence Signals Directorate • Degree of anonymity • Delegated Path Discovery • Delegated Path Validation • Deniable encryption • Derek Taunt • Derived unique key per transaction • DES Challenges • DES supplementary material • DES-X • Deterministic encryption • DFC (cipher) • Dictionary attack • Differential cryptanalysis • Differential-linear attack • Differential power analysis • Diffie–Hellman key exchange • Diffie–Hellman problem • DigiCipher 2 • Digital Fortress • Digital rights management • Digital signature • Digital Signature Algorithm • Digital signature forgery • Digital timestamping • Digital watermarking • Dilly Knox • Dining cryptographers problem • Diplomatic bag • Direct Anonymous Attestation • Discrete logarithm • Disk encryption • Disk encryption hardware • Disk encryption software • Distance-bounding protocol • Distinguishing attack • Distributed.net • DMA attack • dm-crypt • Dmitry Sklyarov • DomainKeys • Don Coppersmith • Dorabella Cipher • Double Ratchet Algorithm • Doug Stinson • Dragon (cipher) • DRYAD • Dual_EC_DRBG •
E0 (cipher) • E2 (cipher) • E4M • EAP-AKA • EAP-SIM • EAX mode • ECC patents • ECHELON • ECRYPT • Edouard Fleissner von Wostrowitz • Edward Hebern • Edward Scheidt • Edward Travis • EFF DES cracker • Efficient Probabilistic Public-Key Encryption Scheme • EKMS • Electronic Communications Act 2000 • Electronic money • Electronic signature • Electronic voting • ElGamal encryption • ElGamal signature scheme • Eli Biham • Elizebeth Friedman • Elliptic-curve cryptography • Elliptic-curve Diffie–Hellman • Elliptic Curve DSA • EdDSA • Elliptic curve only hash • Elonka Dunin • Encrypted function • Encrypted key exchange • Encrypting File System • Encryption • Encryption software • Enigmail • Enigma machine • Enigma rotor details • Entrust • Ernst Fetterlein • eSTREAM • Étienne Bazeries • Eurocrypt • EuroCrypt • Export of cryptography • Extensible Authentication Protocol
Fast Software Encryption • Fast syndrome-based hash • FEA-M • FEAL • Feige–Fiat–Shamir identification scheme • Feistel cipher • Félix Delastelle • Fialka • Filesystem-level encryption • FileVault • Fill device • Financial cryptography • FIPS 140 • FIPS 140-2 • Firefly (key exchange protocol) • FISH (cipher) • Fish (cryptography) • Floradora • Fluhrer, Mantin and Shamir attack • Format-preserving encryption • Fortezza • Fort George G. Meade • Fortuna (PRNG) • Four-square cipher • Franciszek Pokorny • Frank A. Stevenson • Frank Rowlett • Freenet • FreeOTFE • FreeS/WAN • Frequency analysis • Friedrich Kasiski • Fritz-chip • FROG • FROSTBURG • FTP over SSH • Full disk encryption • Full Domain Hash • F. W. Winterbotham
Galois/Counter Mode • Gardening (cryptanalysis) • GCHQ Bude • GCHQ CSO Morwenstow • GDES • Generic Security Services Application Program Interface • George Blakley • George Scovell • GGH encryption scheme • GGH signature scheme • Gilbert Vernam • GMR (cryptography) • GNU Privacy Guard • GnuTLS • Goldwasser–Micali cryptosystem • Gordon Welchman • GOST (block cipher) • GOST (hash function) • Government Communications Headquarters • Government Communications Security Bureau • Grain (cipher) • Grand Cru (cipher) • Great Cipher • Grill (cryptology) • Grille (cryptography) • Group-based cryptography • Group signature • Grover's algorithm • Gustave Bertrand • Gwido Langer
H.235 • HAIFA construction • HAIPE • Hans Dobbertin • Hans-Thilo Schmidt • Hard-core predicate • Hardware random number generator • Hardware security module • Harold Keen • Harry Hinsley • Harvest (computer) • HAS-160 • Hash-based cryptography • Hashcash • Hash chain • Hash function security summary • Hash list • Hasty Pudding cipher • HAVAL • HC-256 • HC-9 • Heath Robinson (codebreaking machine) • Hebern rotor machine • Henri Braquenié • Henryk Zygalski • Herbert Yardley • Hidden Field Equations • Hideki Imai • Hierocrypt • High-bandwidth Digital Content Protection • Higher-order differential cryptanalysis • Hill cipher • History of cryptography • HMAC • HMAC-based One-time Password algorithm (HOTP) • Horst Feistel • Howard Heys • Https • Hugo Hadwiger • Hugo Koch • Hushmail • Hut 6 • Hut 8 • HX-63 • Hybrid cryptosystem • Hyperelliptic curve cryptography • Hyper-encryption
Ian Goldberg • IBM 4758 • ICE (cipher) • ID-based cryptography • IDEA NXT • Identification friend or foe • IEEE 802.11i • IEEE P1363 • I. J. Good • Illegal prime • Impossible differential cryptanalysis • Index of coincidence • Indifferent chosen-ciphertext attack • Indistinguishability obfuscation • Indocrypt • Information leakage • Information Security Group • Information-theoretic security • Initialization vector • Integer factorization • Integral cryptanalysis • Integrated Encryption Scheme • Integrated Windows Authentication • Interlock protocol • Intermediate certificate authorities • International Association for Cryptologic Research • International Data Encryption Algorithm • Internet Key Exchange • Internet Security Association and Key Management Protocol • Interpolation attack • Invisible ink • IPsec • Iraqi block cipher • ISAAC (cipher) • ISO 19092-2 • ISO/IEC 9797 • Ivan Damgård
Jacques Stern • JADE (cypher machine) • James Gillogly • James H. Ellis • James Massey • Jan Graliński • Jan Kowalewski • Japanese naval codes • Java Cryptography Architecture • Jefferson disk • Jennifer Seberry • Jerzy Różycki • Joan Daemen • Johannes Trithemius • John Herivel • John Kelsey (cryptanalyst) • John R. F. Jeffreys • John Tiltman • Jon Lech Johansen • Josef Pieprzyk • Joseph Desch • Joseph Finnegan (cryptographer) • Joseph Mauborgne • Joseph Rochefort • Journal of Cryptology • Junger v. Daley
Kaisa Nyberg • Kalyna (cipher) • Kasiski examination • KASUMI • KCDSA • KeePass • Kerberos (protocol) • Kerckhoffs's principle • Kevin McCurley (cryptographer) • Key-agreement protocol • Key authentication • Key clustering • Key (cryptography) • Key derivation function • Key distribution center • Key escrow • Key exchange • Keyfile • Key generation • Key generator • Key management • Key-recovery attack • Key schedule • Key server (cryptographic) • Key signature (cryptography) • Keysigning • Key signing party • Key size • Key space (cryptography) • Keystream • Key stretching • Key whitening • KG-84 • KHAZAD • Khufu and Khafre • Kiss (cryptanalysis) • KL-43 • KL-51 • KL-7 • Kleptography • KN-Cipher • Knapsack problem • Known-key distinguishing attack • Known-plaintext attack • KnownSafe • KOI-18 • KOV-14 • Kryha • Kryptos • KSD-64 • Kupyna • Kuznyechik • KW-26 • KW-37 • KY-3 • KY-57 • KY-58 • KY-68 • KYK-13
Lacida • Ladder-DES • Lamport signature • Lars Knudsen • Lattice-based cryptography • Laurance Safford • Lawrie Brown • LCS35 • Leo Marks • Leonard Adleman • Leon Battista Alberti • Leo Rosen • Leslie Yoxall • LEVIATHAN (cipher) • LEX (cipher) • Libelle (cipher) • Linear cryptanalysis • Linear-feedback shift register • Link encryption • List of ciphertexts • List of cryptographers • List of cryptographic file systems • List of cryptographic key types • List of cryptology conferences • List of telecommunications encryption terms • List of people associated with Bletchley Park • List of SFTP clients • List of SFTP server software • LOKI • LOKI97 • Lorenz cipher • Louis W. Tordella • Lsh • Lucifer (cipher) • Lyra2
M6 (cipher) • M8 (cipher) • M-209 • M-325 • M-94 • MacGuffin (cipher) • Madryga • MAGENTA • Magic (cryptography) • Maksymilian Ciężki • Malcolm J. Williamson • Malleability (cryptography) • Man-in-the-middle attack • Marian Rejewski • MARS (cryptography) • Martin Hellman • MaruTukku • Massey–Omura cryptosystem • Matt Blaze • Matt Robshaw • Max Newman • McEliece cryptosystem • mcrypt • MD2 (cryptography) • MD4 • MD5 • MD5CRK • MDC-2 • MDS matrix • Mean shortest distance • Meet-in-the-middle attack • Mental poker • Mercury (cipher machine) • Mercy (cipher) • Meredith Gardner • Merkle signature scheme • Merkle–Damgård construction • Merkle–Hellman knapsack cryptosystem • Merkle's Puzzles • Merkle tree • MESH (cipher) • Message authentication • Message authentication code • Message forgery • MI8 • Michael Luby • MICKEY • Microdot • Military Cryptanalysis (book) (William F. Friedman) • Military Cryptanalytics • Mimic function • Mirror writing • MISTY1 • Mitsuru Matsui • MMB (cipher) • Mod n cryptanalysis • MQV • MS-CHAP • MUGI • MULTI-S01 • MultiSwap • Multivariate cryptography
National Communications Centre • National Cryptologic Museum • National Security Agency • National Cipher Challenge • Navajo I • Neal Koblitz • Needham–Schroeder protocol • Negligible function • NEMA (machine) • NESSIE • Network Security Services • Neural cryptography • New Data Seal • NewDES • N-Hash • Nicolas Courtois • Niederreiter cryptosystem • Niels Ferguson • Nigel de Grey • Nihilist cipher • Nikita Borisov • Nimbus (cipher) • NIST hash function competition • Nonlinear-feedback shift register • NOEKEON • Non-malleable codes • Noreen • Nothing up my sleeve number • NSA cryptography • NSA encryption systems • NSA in fiction • NSAKEY • NSA Suite A Cryptography • NSA Suite B Cryptography • NT LAN Manager • NTLMSSP • NTRUEncrypt • NTRUSign • Null cipher • Numbers station • NUSH • NTRU
Oblivious transfer • OCB mode • Oded Goldreich • Off-the-Record Messaging • Okamoto–Uchiyama cryptosystem • OMI cryptograph • OMNI (SCIP) • One-key MAC • One-time pad • One-time password • One-way compression function • One-way function • Onion routing • Online Certificate Status Protocol • OP-20-G • OpenPGP card • OpenSSH • OpenSSL • Openswan • OpenVPN • Operation Ruthless • Optimal asymmetric encryption padding • Over the Air Rekeying (OTAR) • OTFE • Otway–Rees protocol
Padding (cryptography) • Padding oracle attack • Paillier cryptosystem • Pairing-based cryptography • Panama (cryptography) • Partitioning cryptanalysis • Passive attack • Passphrase • Password • Password-authenticated key agreement • Password cracking • Password Hashing Competition • Paul Kocher • Paulo Pancatuccio • Paulo S. L. M. Barreto • Paul van Oorschot • PBKDF2 • PC Bruno • Pepper (cryptography) • Perfect forward secrecy • Perforated sheets • Permutation cipher • Peter Gutmann (computer scientist) • Peter Junger • Peter Twinn • PGP Corporation • PGPDisk • PGPfone • Phelix • Phil Zimmermann • Photuris (protocol) • Physical security • Physical unclonable function • Pig Latin • Pigpen cipher • Pike (cipher) • Piling-up lemma • Pinwheel (cryptography) • Piotr Smoleński • Pirate decryption • PKC (conference) • PKCS • PKCS 11 • PKCS 12 • PKIX • Plaintext • Plaintext-aware encryption • Playfair cipher • Plugboard • PMAC (cryptography) • Poem code • Pohlig–Hellman algorithm • Point-to-Point Tunneling Protocol • Pointcheval–Stern signature algorithm • Poly1305 • Polyalphabetic cipher • Polybius square • Portex • Post-quantum cryptography • Post-Quantum Cryptography Standardization • Power analysis • Preimage attack • Pre-shared key • Pretty Good Privacy • Printer steganography • Privacy-enhanced Electronic Mail • Private Communications Technology • Private information retrieval • Probabilistic encryption • Product cipher • Proof-of-work system • Protected Extensible Authentication Protocol • Provable security • Provably secure cryptographic hash function • Proxy re-encryption • Pseudo-Hadamard transform • Pseudonymity • Pseudorandom function • Pseudorandom number generator • Pseudorandom permutation • Public key certificate • Public-key cryptography • Public key fingerprint • Public key infrastructure • PURPLE • PuTTY • Py (cipher)
Q (cipher) • Qrpff • QUAD (cipher) • Quadratic sieve • Quantum coin flipping • Quantum cryptography • Quantum digital signature • Quantum fingerprinting • Quantum key distribution
Rabbit (cipher) • Rabin cryptosystem • Rabin–Williams encryption • RadioGatún • Rail fence cipher • Rainbow table • Ralph Merkle • Rambutan (cryptography) • Random function • Randomness tests • Random number generator attack • Random oracle • RC2 • RC4 • RC5 • RC6 • Rebound attack • Reciprocal cipher • Red/black concept • REDOC • Red Pike (cipher) • Reflector (cipher machine) • Regulation of Investigatory Powers Act 2000 • Reihenschieber • Rekeying (cryptography) • Related-key attack • Replay attack • Reservehandverfahren • Residual block termination • Rijndael key schedule • Rijndael S-box • Ring signature • RIPEMD • Rip van Winkle cipher • Robert Morris (cryptographer) • Robot certificate authority • Rockex • Rolf Noskwith • Ron Rivest • Room 40 • Root certificate • Ross J. Anderson • Rossignols • ROT13 • Rotor machine • RSA RSA • RSA-100 • RSA-1024 • RSA-110 • RSA-120 • RSA-129 • RSA-130 • RSA-140 • RSA-150 • RSA-1536 • RSA-155 • RSA-160 • RSA-170 • RSA-180 • RSA-190 • RSA-200 • RSA-2048 • RSA-210 • RSA-220 • RSA-230 • RSA-232 • RSA-240 • RSA-250 • RSA-260 • RSA-270 • RSA-280 • RSA-290 • RSA-300 • RSA-309 • RSA-310 • RSA-320 • RSA-330 • RSA-340 • RSA-350 • RSA-360 • RSA-370 • RSA-380 • RSA-390 • RSA-400 • RSA-410 • RSA-420 • RSA-430 • RSA-440 • RSA-450 • RSA-460 • RSA-470 • RSA-480 • RSA-490 • RSA-500 • RSA-576 • RSA-617 • RSA-640 • RSA-704 • RSA-768 • RSA-896 • RSA-PSS • RSA Factoring Challenge • RSA problem • RSA Secret-Key Challenge • RSA Security • Rubber-hose cryptanalysis • Running key cipher • Russian copulation
S-1 block cipher • SAFER • Salsa20 • Salt (cryptography) • SAM card • Security Support Provider Interface • SAML • SAVILLE • SC2000 • Schnorr group • Schnorr signature • Schoof–Elkies–Atkin algorithm • SCIP • Scott Vanstone • Scrambler • Scramdisk • Scream (cipher) • Scrypt • Scytale • Seahorse (software) • SEAL (cipher) • Sean Murphy (cryptographer) • SECG • Secret broadcast • Secret decoder ring • Secrets and Lies (Schneier) • Secret sharing • Sectéra Secure Module • Secure access module • Secure channel • Secure Communication based on Quantum Cryptography • Secure copy • Secure cryptoprocessor • Secure Electronic Transaction • Secure Hash Algorithms • Secure Hypertext Transfer Protocol • Secure key issuing cryptography • Secure multi-party computation • Secure Neighbor Discovery • Secure Real-time Transport Protocol • Secure remote password protocol • Secure Shell • Secure telephone • Secure Terminal Equipment • Secure voice • SecurID • Security association • Security engineering • Security level • Security parameter • Security protocol notation • Security through obscurity • Security token • SEED • Selected Areas in Cryptography • Self-certifying File System • Self-shrinking generator • Self-signed certificate • Semantic security • Serge Vaudenay • Serpent (cipher) • Session key • SHACAL • Shafi Goldwasser • SHA-1 • SHA-2 • SHA-3 • Shared secret • SHARK • Shaun Wylie • Shor's algorithm • Shrinking generator • Shugborough inscription • Side-channel attack • Siemens and Halske T52 • SIGABA • SIGCUM • SIGINT • Signal Protocol • Signal Intelligence Service • Signcryption • SIGSALY • SILC (protocol) • Silvio Micali • Simple Authentication and Security Layer • Simple public-key infrastructure • Simple XOR cipher • S/KEY • Skein (hash function) • Skipjack (cipher) • Slide attack • Slidex • Small subgroup confinement attack • S/MIME • SM4 algorithm (formerly SMS4) • Snake oil (cryptography) • Snefru • SNOW • Snuffle • SOBER-128 • Solitaire (cipher) • Solomon Kullback • SOSEMANUK • Special Collection Service • Spectr-H64 • SPEKE (cryptography) • Sponge function • SPNEGO • Square (cipher) • Ssh-agent • Ssh-keygen • SSH File Transfer Protocol • SSLeay • Stafford Tavares • Standard model (cryptography) • Station CAST • Station HYPO • Station-to-Station protocol • Statistical cryptanalysis • Stefan Lucks • Steganalysis • Steganography • Straddling checkerboard • Stream cipher • Stream cipher attacks • Strong cryptography • Strong RSA assumption • Stuart Milner-Barry • STU-II • STU-III • Stunnel • Substitution box • Substitution cipher • Substitution–permutation network • Superencryption • Supersingular isogeny key exchange • Swedish National Defence Radio Establishment • SWIFFT • SXAL/MBAL • Symmetric-key algorithm • SYSKEY
Tabula recta • Taher Elgamal • Tamper resistance • Tcpcrypt • Television encryption • TEMPEST • Template:Cryptographic software • Temporal Key Integrity Protocol • Testery • Thawte • The Alphabet Cipher • The Code Book • The Codebreakers • The Gold-Bug • The Magic Words are Squeamish Ossifrage • Theory of Cryptography Conference • The world wonders • Thomas Jakobsen • Three-pass protocol • Threshold shadow scheme • TICOM • Tiger (cryptography) • Timeline of cryptography • Time/memory/data tradeoff attack • Time-based One-time Password algorithm (TOTP) • Timing attack • Tiny Encryption Algorithm • Tom Berson • Tommy Flowers • Topics in cryptography • Tor (anonymity network) • Torus-based cryptography • Traffic analysis • Traffic-flow security • Traitor tracing • Transmission security • Transport Layer Security • Transposition cipher • Trapdoor function • Trench code • Treyfer • Trifid cipher • Triple DES • Trivium (cipher) • TrueCrypt • Truncated differential cryptanalysis • Trusted third party • Turing (cipher) • TWINKLE • TWIRL • Twofish • Two-square cipher • Type 1 encryption • Type 2 encryption • Type 3 encryption • Type 4 encryption • Typex
UES (cipher) • Ultra (cryptography) • UMAC • Unbalanced Oil and Vinegar • Undeniable signature • Unicity distance • Universal composability • Universal one-way hash function (UOWHF)
Venona project • Verifiable secret sharing • Verisign • Very smooth hash • VEST • VIC cipher • VideoCrypt • Vigenère cipher • Vincent Rijmen • VINSON • Virtual private network • Visual cryptography • Voynich manuscript
Wadsworth's cipher • WAKE • WLAN Authentication and Privacy Infrastructure • Watermark (data file) • Watermarking attack • Weak key • Web of trust • Whirlpool (hash function) • Whitfield Diffie • Wide Mouth Frog protocol • Wi-Fi Protected Access • William F. Friedman • William Montgomery (cryptographer) • WinSCP • Wired Equivalent Privacy • Wireless Transport Layer Security • Witness-indistinguishable proof • Workshop on Cryptographic Hardware and Embedded Systems • World War I cryptography • World War II cryptography • W. T. Tutte
X.509 • XDH assumption • Xiaoyun Wang • XML Encryption • XML Signature • xmx • XSL attack • XTEA • XTR • Xuejia Lai • XXTEA 10-00-00-00-00
Zeroisation • Zero-knowledge password proof • Zero-knowledge proof • Zfone • Zodiac (cipher) • ZRTP • Zimmermann–Sassaman key-signing protocol • Zimmermann Telegram
Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.
Diffie–Hellman (DH) key exchange is a mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. DH is one of the earliest practical examples of public key exchange implemented within the field of cryptography. Published in 1976 by Diffie and Hellman, this is the earliest publicly known work that proposed the idea of a private key and a corresponding public key.
In cryptography, encryption is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Despite its goal, encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem, one of the oldest widely used for secure data transmission. The initialism "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly in 1973 at Government Communications Headquarters (GCHQ), the British signals intelligence agency, by the English mathematician Clifford Cocks. That system was declassified in 1997.
Ralph C. Merkle is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange.
In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange. It was described by Taher Elgamal in 1985. ElGamal encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm (DSA) is a variant of the ElGamal signature scheme, which should not be confused with ElGamal encryption.
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.
Key exchange is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis.
Multiple encryption is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm. It is also known as cascade encryption, cascade ciphering, multiple encryption, and superencipherment. Superencryption refers to the outer-level encryption of a multiple encryption.
The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computational intractability of the Decisional Diffie–Hellman assumption. Developed by Ronald Cramer and Victor Shoup in 1998, it is an extension of the ElGamal cryptosystem. In contrast to ElGamal, which is extremely malleable, Cramer–Shoup adds other elements to ensure non-malleability even against a resourceful attacker. This non-malleability is achieved through the use of a universal one-way hash function and additional computations, resulting in a ciphertext which is twice as large as in ElGamal.
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very high level of protection against any eavesdropper, including the government agencies. There is no precise definition of the boundary line between the strong cryptography and (breakable) weak cryptography, as this border constantly shifts due to improvements in hardware and cryptanalysis techniques. These improvements eventually place the capabilities once available only to the NSA within the reach of a skilled individual, so in practice there are only two levels of cryptographic security, "cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files".
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions.
Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.
The following outline is provided as an overview of and topical guide to cryptography:
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms that are currently thought to be secure against a cryptanalytic attack by a quantum computer. Most widely-used public-key algorithms rely on the difficulty of one of three mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems could be easily solved on a sufficiently powerful quantum computer running Shor's algorithm or even faster and less demanding alternatives.
Hugo Krawczyk is an Argentine-Israeli cryptographer best known for co-inventing the HMAC message authentication algorithm and contributing in fundamental ways to the cryptographic architecture of central Internet standards, including IPsec, IKE, and SSL/TLS. In particular, both IKEv2 and TLS 1.3 use Krawczyk’s SIGMA protocol as the cryptographic core of their key exchange procedures. He has also contributed foundational work in the areas of threshold and proactive cryptosystems and searchable symmetric encryption, among others.