Cryptology/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
imported>Sandy Harris (re-order some) |
||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
==Parent topics== | ==Parent topics== | ||
Line 22: | Line 21: | ||
{{r|Data Encryption Standard}} | {{r|Data Encryption Standard}} | ||
{{r|Enigma machine}} | {{r|Enigma machine}} | ||
{{r|PURPLE machine}} | |||
== Famous cryptologists == | |||
The [[AES competition]] article has a [[AES_competition/Catalogs/AES_players|list of well-known players]] involved in that. | |||
{{r|William Friedman}} | {{r|William Friedman}} | ||
{{r|Auguste Kerckhoffs}} | {{r|Auguste Kerckhoffs}} | ||
{{r|Alan Turing}} | {{r|Alan Turing}} | ||
{{r|Claude Shannon}} | |||
{{r|Sir Francis Walsingham}} | |||
== | == Government cryptology == | ||
{{r|Communications intelligence}} | {{r|Communications intelligence}} | ||
{{r|Communications Security Establishment}} | {{r|Communications Security Establishment}} | ||
{{r|Government Communications Headquarters}} | {{r|Government Communications Headquarters}} | ||
{{r|Government Communications Security Bureau}} | {{r|Government Communications Security Bureau}} | ||
{{r|National Security Agency}} | {{r|National Security Agency}} | ||
{{r|Signals intelligence}} | |||
{{r|Foreign Intelligence Surveillance Act}} | |||
==Other related topics== | |||
{{r|FAPSI}} | |||
{{r|Radiofrequency MASINT}} | {{r|Radiofrequency MASINT}} | ||
{{r|Random number}} | {{r|Random number}} | ||
{{r|Wiretapping}} | {{r|Wiretapping}} |
Revision as of 16:58, 31 July 2010
- See also changes related to Cryptology, or pages that link to Cryptology or to this page or whose text contains "Cryptology".
Parent topics
- Communication [r]: The set of interactive processes that create shared meaning. [e]
- Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]
- Convergence of communications [r]: Technical specifications and infrastructure to allow all types of communications (e.g., telephone, web, television) to interface over a common set of information transfer technologies [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Linguistics [r]: The scientific study of language. [e]
- Mathematics [r]: The study of quantities, structures, their relations, and changes thereof. [e]
- Statistics [r]: A branch of mathematics that specializes in enumeration, or counted, data and their relation to measured data. [e]
- Telecommunications [r]: Add brief definition or description
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Code [r]: Add brief definition or description
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Enigma machine [r]: The primary high-security cryptographic communications security machine of Nazi Germany. Unknown to the Germans, it had been substantially cryptanalyzed by the British Government Code and Cipher School, with French, Polish, and U.S. help. [e]
- PURPLE machine [r]: Add brief definition or description
Famous cryptologists
The AES competition article has a list of well-known players involved in that.
- William Friedman [r]: Add brief definition or description
- Auguste Kerckhoffs [r]: Add brief definition or description
- Alan Turing [r]: British mathematician, code breaker and computer pioneer. [e]
- Claude Shannon [r]: (1916-2001) American theoretical mathematician, founder of information theory. [e]
- Sir Francis Walsingham [r]: Add brief definition or description
Government cryptology
- Communications intelligence [r]: Add brief definition or description
- Communications Security Establishment [r]: Add brief definition or description
- Government Communications Headquarters [r]: Add brief definition or description
- Government Communications Security Bureau [r]: Add brief definition or description
- National Security Agency [r]: Add brief definition or description
- Signals intelligence [r]: Add brief definition or description
- Foreign Intelligence Surveillance Act [r]: Add brief definition or description