Cryptography/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz |
John Leach (talk | contribs) m (Text replacement - "{{r|Cryptology}}↵" to "") |
||
Line 3: | Line 3: | ||
==Parent topics== | ==Parent topics== | ||
{{r|Information security}} | {{r|Information security}} | ||
{{r|Information theory}} | {{r|Information theory}} | ||
{{r|Signals intelligence}} | {{r|Signals intelligence}} |
Revision as of 13:41, 18 March 2024
- See also changes related to Cryptography, or pages that link to Cryptography or to this page or whose text contains "Cryptography".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
- Signals intelligence [r]: Add brief definition or description
Subtopics
Modes of encryption
- Bulk encryption [r]: The encipherment of all traffic on a digital transmission medium, without awareness of multiplexed channels, data link protocols, etc., in the medium. [e]
- Message encryption [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
- Secure Sockets Layer [r]: Add brief definition or description
- Transport Layer Security [r]: Add brief definition or description
Ciphers
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Alphabetic substitution [r]: Add brief definition or description
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Enigma machine [r]: The primary high-security cryptographic communications security machine of Nazi Germany. Unknown to the Germans, it had been substantially cryptanalyzed by the British Government Code and Cipher School, with French, Polish, and U.S. help. [e]
- Feistel cipher [r]: Add brief definition or description
- Hagelin machine [r]: Add brief definition or description
- One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
- Playfair cipher [r]: Add brief definition or description
- Pretty Good Privacy [r]: E-mail encryption package created by Phillip Zimmerman. [e]
- Rotor machine [r]: Add brief definition or description
- Vigenère cipher [r]: Add brief definition or description
- PURPLE machine [r]: Add brief definition or description
- SIGABA [r]: Add brief definition or description
- Quantum cryptography [r]: Add brief definition or description
- TACLANE [r]: Add brief definition or description
- FASTLANE [r]: Add brief definition or description
Codes
Cryptanalysis
- Cryptanalysis [r]: Add brief definition or description
- ULTRA [r]: Add brief definition or description
Key management
- Internet Key Exchange [r]: Add brief definition or description
- Key generation (cryptographic) [r]: Add brief definition or description
- Key management (cryptographic) [r]: Add brief definition or description
- Session key [r]: Add brief definition or description
Personalities
- Claude Shannon [r]: Add brief definition or description
- William Friedman [r]: Add brief definition or description
- Auguste Kerckhoffs [r]: Add brief definition or description
- Alan Turing [r]: Add brief definition or description
Organizations
- Communications Security Establishment [r]: Add brief definition or description
- Defense Signals Directorate [r]: Add brief definition or description
- FAPSI [r]: Add brief definition or description
- Government Communications Headquarters [r]: Add brief definition or description
- Government Communications Security Bureau [r]: Add brief definition or description
- National Security Agency [r]: Add brief definition or description
- Politics of cryptography [r]: Add brief definition or description
- Privacy [r]: Add brief definition or description
- Steganography [r]: Add brief definition or description
- Covert channel [r]: Add brief definition or description
Authentication
- Authentication [r]: Add brief definition or description
- Digital certificate [r]: Add brief definition or description
- Digital signature [r]: Add brief definition or description
- Extensible Authentication Protocol [r]: Add brief definition or description
- Public Key Infrastructure [r]: Add brief definition or description