Cryptography/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
m (Text replacement - "{{r|Cryptology}}↵" to "")
No edit summary
 
(3 intermediate revisions by one other user not shown)
Line 4: Line 4:
{{r|Information security}}
{{r|Information security}}
{{r|Information theory}}
{{r|Information theory}}
{{r|Signals intelligence}}
 
{{r|Communications intelligence||**}}
{{r|Communications intelligence||**}}
==Subtopics==
==Subtopics==
Line 27: Line 27:
{{r|Rotor machine}}
{{r|Rotor machine}}
{{r|Vigenère cipher}}
{{r|Vigenère cipher}}
{{r|PURPLE machine}}
{{r|SIGABA}}
{{r|SIGABA}}
{{r|Quantum cryptography}}
{{r|Quantum cryptography}}
Line 53: Line 52:
{{r|Defense Signals Directorate}}
{{r|Defense Signals Directorate}}
{{r|FAPSI}}
{{r|FAPSI}}
{{r|Government Communications Headquarters}}
 
{{r|Government Communications Security Bureau}}
{{r|Government Communications Security Bureau}}
{{r|National Security Agency}}
{{r|National Security Agency}}
Line 71: Line 70:
{{r|Unicity distance}}
{{r|Unicity distance}}
{{r|Zero-knowledge protocol}}
{{r|Zero-knowledge protocol}}
==Articles related by keyphrases (Bot populated)==
{{r|Computer Go}}
{{r|RSA algorithm}}
{{r|Key management}}

Latest revision as of 12:00, 3 August 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Cryptography.
See also changes related to Cryptography, or pages that link to Cryptography or to this page or whose text contains "Cryptography".

Parent topics

  • Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
  • Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]

Subtopics

Modes of encryption

Ciphers

Codes

Cryptanalysis

Key management

Personalities

Organizations

Other related topics

Authentication

Mathematical principles

Articles related by keyphrases (Bot populated)