Cryptography/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (First rearrangement) |
imported>Sandy Harris |
||
Line 47: | Line 47: | ||
{{r|William Friedman}} | {{r|William Friedman}} | ||
{{r|Auguste Kerckhoffs}} | {{r|Auguste Kerckhoffs}} | ||
{{R|Alan Turing}} | |||
==Other related topics== | ==Other related topics== | ||
{{r|politics of cryptography}} | {{r|politics of cryptography}} |
Revision as of 20:15, 22 May 2010
- See also changes related to Cryptography, or pages that link to Cryptography or to this page or whose text contains "Cryptography".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Cryptology [r]: The theory and practice of protecting the content of communications, and of defeating the protective measures [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
- Signals intelligence [r]: Add brief definition or description
Subtopics
Modes of encryption
- Bulk encryption [r]: The encipherment of all traffic on a digital transmission medium, without awareness of multiplexed channels, data link protocols, etc., in the medium. [e]
- Message encryption [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
- Secure Sockets Layer [r]: Add brief definition or description
- Transport Layer Security [r]: Add brief definition or description
Ciphers
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Alphabetic substitution [r]: Add brief definition or description
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Enigma machine [r]: The primary high-security cryptographic communications security machine of Nazi Germany. Unknown to the Germans, it had been substantially cryptanalyzed by the British Government Code and Cipher School, with French, Polish, and U.S. help. [e]
- Feistel cipher [r]: Add brief definition or description
- Hagelin machine [r]: Add brief definition or description
- One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
- Playfair cipher [r]: Add brief definition or description
- Pretty Good Privacy [r]: E-mail encryption package created by Phillip Zimmerman. [e]
- Rotor machine [r]: Add brief definition or description
- Vigenère cipher [r]: Add brief definition or description
- PURPLE machine [r]: Add brief definition or description
- SIGABA [r]: Add brief definition or description
- Quantum cryptography [r]: Add brief definition or description
- TACLANE [r]: Add brief definition or description
- FASTLANE [r]: Add brief definition or description
Codes
Cryptanalysis
Key management
- Internet Key Exchange [r]: Add brief definition or description
- Key generation (cryptographic) [r]: Add brief definition or description
- Key management (cryptographic) [r]: Add brief definition or description
- Session key [r]: Add brief definition or description
Personalities
- Claude Shannon [r]: Add brief definition or description
- William Friedman [r]: Add brief definition or description
- Auguste Kerckhoffs [r]: Add brief definition or description
- Alan Turing [r]: Add brief definition or description
- Politics of cryptography [r]: Add brief definition or description
- Privacy [r]: Add brief definition or description
- Steganography [r]: Add brief definition or description
- Covert channel [r]: Add brief definition or description
Authentication
- Authentication [r]: Add brief definition or description
- Digital certificate [r]: Add brief definition or description
- Digital signature [r]: Add brief definition or description
- Extensible Authentication Protocol [r]: Add brief definition or description
- Public Key Infrastructure [r]: Add brief definition or description