Cryptology/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
m (Text replacement - "{{r|Communications intelligence}}" to "")
 
(8 intermediate revisions by 3 users not shown)
Line 3: Line 3:
==Parent topics==
==Parent topics==
{{r|Information security}}   
{{r|Information security}}   
{{r|Signals intelligence}}
 


==Subtopics==
==Subtopics==
Line 11: Line 11:
{{r|Symmetric key cryptography}}
{{r|Symmetric key cryptography}}
{{r|Asymmetric key cryptography}}
{{r|Asymmetric key cryptography}}
{{r|Steganography}}


== Main techniques ==
== Main techniques ==
Line 23: Line 24:
{{r|Cryptographic key}}
{{r|Cryptographic key}}


== Famous instances ==
== Well-known instances ==


{{r|Data Encryption Standard}}
{{r|Data Encryption Standard}}
{{r|Advanced Encryption Standard}}
{{r|Advanced Encryption Standard}}
{{r|RSA algorithm}}
{{r|Diffie-Hellman}}
{{r|Enigma machine}}
{{r|Enigma machine}}
{{r|PURPLE machine}}
{{r|Pretty Good Privacy}}
{{r|IPsec}}


== Famous cryptologists ==
== Famous cryptologists ==
Line 40: Line 44:


== Government cryptology ==
== Government cryptology ==
{{r|Communications intelligence}}
 
{{r|Signals intelligence}}
 
{{r|Radiofrequency MASINT}}
{{r|Radiofrequency MASINT}}
{{r|Communications Security Establishment}}
{{r|Communications Security Establishment}}
{{r|Government Communications Headquarters}}
 
{{r|Government Communications Security Bureau}}
{{r|Government Communications Security Bureau}}
{{r|National Security Agency}}
{{r|National Security Agency}}
Line 61: Line 65:
{{r|Statistics}}
{{r|Statistics}}
{{r|Telecommunications}}
{{r|Telecommunications}}
==Articles related by keyphrases (Bot populated)==
{{r|RSA algorithm}}
{{r|Greek}}
{{r|Term (disambiguation)}}
{{r|OpenLeaks}}
{{r|History of cryptology}}

Latest revision as of 07:33, 26 August 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Cryptology.
See also changes related to Cryptology, or pages that link to Cryptology or to this page or whose text contains "Cryptology".

Parent topics


Subtopics

Main techniques

  • Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
  • Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
  • Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
  • Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
  • One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
  • Random number generator [r]: A member of a sequence of which the successive values cannot be predicted, produced by measurement of physical phenomena, appropriate algorithms, or a combination of the two [e]
  • Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
  • Code (cryptography) [r]: A means of substituting, for the linguistically meaningful symbols of plaintext composed of words or other symbols meaningful to humans, into inherently meaningless numbers, letters, or words that make no sense to a recipient who is not in possession of a codebook or other means of reversing the substitution of symbols [e]
  • Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]

Well-known instances

Famous cryptologists

The AES competition article has a list of well-known players involved in that.

Government cryptology

Other related topics

Articles related by keyphrases (Bot populated)