Jump to content

Index of cryptography articles

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Matt Crypto (talk | contribs) at 09:17, 16 April 2004 (=B= Bernstein v. United States --). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

This page aims to alphabetically list terms that are related to cryptography. There is an organized (somewhat annotated) list of many/most of the same articles in subject groupings at Topics in cryptography; it will probably be more useful to those attempting to make some sense of the field. This article is intended to be useful to those interested in the Wikipedia's coverage of the subject (eg, for editing or maintenance purposes) by providing an easy way to monitor changes in the indexed articles by clicking on "Related changes" in the sidebar or the link below:

This list does not necessarily include all cryptographically related articles in the Wikipedia, though there is a concerted effort to keep it so. Nevertheless, if you see an article that should be here, but isn't (or one that shouldn't be here but is), please do update this article accordingly.

See also

Digits and symbols

3-Way -- 40-bit encryption --

A

A5/1 -- A5/2 -- Abraham Sinkov -- Adaptive chosen ciphertext attack -- ADFGVX cipher -- Adi Shamir -- Advanced Encryption Standard (AES) -- Advanced Encryption Standard process -- Affine cipher -- Agnes Meyer Driscoll -- Alan Turing -- Anonymous remailer -- Arne Beurling -- Arthur Scherbius -- Asymmetric key algorithm -- Atbash cipher -- Attacker -- Auguste Kerckhoffs -- Authentication -- Autokey cipher --

B

Babington plot -- Baby-step giant-step -- Beale ciphers -- Bernstein v. United States -- Bit-flipping attack -- Blaise de Vigenère -- Bletchley Park -- Blinding -- Blind signature -- Block cipher -- Block cipher modes of operation -- Block size -- Blowfish -- Blum Blum Shub -- Book cipher -- Books on cryptography -- Boris Hagelin -- Bruce Schneier -- Brute force attack -- Burrows-Abadi-Needham logic --

C

Caesar cipher -- CAcert -- CAST-128 -- Camellia -- Certificate authority -- Certificate-based encryption -- Certificateless Cryptography -- Certificate Revocation List -- Chaffing and winnowing -- Characters in cryptography -- Chosen ciphertext attack -- Chosen plaintext attack -- Cipher -- Cipher Block Chaining -- Cipherspace -- Ciphertext-only attack -- Claude Shannon -- Clifford Cocks -- Clipper chip -- Code -- Codebook -- Code talkers -- Colossus computer -- Commitment scheme -- Common Scrambling Algorithm -- Communications security (COMSEC) -- Communication Theory of Secrecy Systems -- Computer insecurity -- Computer surveillance -- COMSEC equipment -- Confidentiality -- Confusion and diffusion -- Content-scrambling system -- Cover -- Covert channel -- Cryptanalysis -- CRYPTO -- Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age -- Crypto system -- Crypto-anarchism -- Cryptogram -- Cryptographic engineering -- Cryptographic hash function -- Cryptographic Message Syntax -- Cryptographically secure pseudo-random number generator -- Cryptographically strong -- Cryptographie indéchiffrable -- Cryptography -- Cryptologia -- Cryptomathic -- Cryptome -- Cryptonomicon -- Crypto-society -- CRYPTREC -- Cypherpunk -- Cyphertext --

D

Daniel J. Bernstein -- Data Encryption Standard -- David Chaum -- David Kahn -- David Wagner -- David Wheeler -- Decipherment -- Decrypt -- DeCSS -- Dictionary attack -- Differential cryptanalysis -- Diffie-Hellman key exchange -- DigiCipher 2 -- Digital rights management -- Digital signature -- Digital Signature Algorithm -- Digital timestamping -- Dining cryptographers protocol -- Diplomatic bag -- Discrete logarithm -- Distributed.net -- Dmitry Sklyarov -- Don Coppersmith -- Dorabella Cipher

E

ECHELON -- Edward Hebern -- Electronic money -- Electronic voting -- ElGamal discrete log cryptosystem -- Eli Biham -- Elizebeth Friedman -- Elliptic curve cryptography -- Elliptic Curve DSA -- Encode -- Encryption -- Enigma machine -- Enigmail -- Espionage -- Étienne Bazeries -- Exclusive disjunction --

F

FEAL -- Feistel cipher -- Financial cryptography -- FISH -- Frank A. Stevenson -- Frank Rowlett -- FreeLIP -- Frequency analysis -- Friedrich Kasiski -- Fritz-chip --

G

Garble -- Geheimfernschreiber -- Gilbert Vernam -- Glossary of telecommunications encryption terms -- GMR -- GNU Privacy Guard -- GOST -- Government Communications Headquarters --

H

Hardware random number generator -- Hebern Rotor Machine -- Henryk Zygalski -- Herbert Yardley -- History of cryptography -- Horst Feistel -- HTTPS -- Hyperelliptic curve cryptography --

I

ID-based cryptography -- Index of coincidence -- Information security -- Information theory -- Initialization vector -- International Association for Cryptologic Research -- International Data Encryption Algorithm (IDEA) -- Internet key exchange -- Invisible ink -- IPSec -- Iraqi block cipher -- ISAAC --

J

Jerzy Rozycki -- JN-25 -- Joan Daemen -- John Tiltman -- Joseph Rochefort -- Joseph Mauborgne -- Journal of Cryptology --

K

Kerberos -- Kerckhoffs' law -- Key-agreement protocol -- Key authentication -- Key -- Key derivation function -- Key distribution center -- Key escrow -- Key exchange -- Key signature -- Key signing party -- Key size -- Keyed-hash message authentication code -- Knapsack problem -- Known-plaintext attack -- Kryptos -- KY-57 --

L

Laurence Safford -- Leo Marks -- Leonard Adleman -- Leone Battista Alberti -- LibTom Project -- Linear cryptanalysis -- Linear feedback shift register -- List of cryptographers -- List of cryptography topics -- List of famous ciphertexts -- Lorenz cypher -- Lucifer --

M

MAGENTA -- Magic -- Man in the middle attack -- Marian Rejewski -- MARS -- Martin Hellman -- Max Newman -- MD4 -- MD5 -- MD5CRK -- Meet-in-the-middle attack -- Merkle-Hellman -- Message Authentication Code -- Message digest -- Microdot --

N

National Security Agency -- Needham-Schroeder -- NESSIE -- Niels Ferguson -- NTRUEncrypt -- Null cipher --

O

Oblivious transfer -- OMAC -- One-time pad -- One way function -- OpenPGP -- OpenSSH -- OpenSSL -- Otway-Rees --

P

Padding -- Paillier cryptosystem -- Passive attack -- Pass phrase -- Password -- Password cracking -- Permutation cipher -- Peter Gutmann -- Phil Zimmermann -- Physical security -- Pike (cipher) -- Plaintext -- Playfair cipher -- PMAC -- Poem code -- Polyalphabetic cipher -- Polybius square -- Pretty Good Privacy -- Privacy-enhanced Electronic Mail -- Product cipher -- Pseudonymity -- Pseudorandom number generator -- Public key certificate -- Public-key cryptography -- Public key infrastructure -- Purple code --

Q

Quantum cryptography --

R

Rabin cryptosystem -- Ralph Merkle -- Random oracle -- RC4 -- RC5 -- RC6 -- Rijndael -- RIPEMD-160 -- Ron Rivest -- Root certificate -- Ross Anderson -- ROT13 -- ROT-47 -- Rotor machine -- RSA -- RSA Security -- Rubber-hose cryptanalysis -- Running key cipher -- Russian copulation --

S

S-1 -- Schnorr signature -- Scott Vanstone -- Scrambler -- Scytale -- SEAL -- Secret sharing -- Secure channel -- Secure cryptoprocessor -- Secure Key Issuing Cryptography -- Secure shell -- Security engineering -- Security protocol notation -- Security through obscurity -- Self-certifying key -- Serpent -- Session key -- SHA-1 -- Shrinking generator -- SIGABA -- SIGINT -- Skipjack -- S/MIME -- Snake oil -- Snefru -- Snuffle -- Solomon Kullback -- Steganography -- Stegotext -- Straddling checkerboard -- Stream cipher -- Substitution box -- Substitution cipher -- Substitution-permutation network -- Symmetric encryption -- Symmetric key algorithm -- SYSKEY --

T

Tabula recta -- Taher ElGamal -- Tamper resistance -- TEMPEST -- The Codebreakers -- The Gold Bug -- The Magic Words are Squeamish Ossifrage -- Tiger -- Timing attack -- Tiny Encryption Algorithm -- Topics in cryptography -- Torus based cryptography -- Traffic analysis -- Transport Layer Security -- Transposition cipher -- Trapdoor function -- Triple DES -- Trusted Third Party -- Tunny -- Twofish -- Type 1 product -- Type 2 product -- Typex --

U

Ultra -- Undeniable signature -- Unicity distance --

V

VENONA project -- VIC cipher -- Vigenère -- Vincent Rijmen -- Visual cryptography -- Voynich Manuscript --

W

WAKE -- Web of trust -- Whitfield Diffie -- WHIRLPOOL -- Wide Mouth Frog -- Wi-Fi Protected Access -- William F. Friedman -- Wired Equivalent Privacy -- W. T. Tutte --

X

X.509 -- XTEA --

Y

Yarrow algorithm --

Z

Zero-knowledge proof -- Zeroise -- Zimmermann Telegram -- Zimmerman-Sassaman key-signing protocol --