Cryptography/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
imported>Sandy Harris |
||
Line 20: | Line 20: | ||
{{r|William Friedman}} | {{r|William Friedman}} | ||
{{r|Hagelin machine}} | {{r|Hagelin machine}} | ||
{{r|Internet Key Exchange | {{r|Internet Key Exchange}} | ||
{{r|IPsec}} | {{r|IPsec}} | ||
{{r|Key generation (cryptographic)}} | {{r|Key generation (cryptographic)}} |
Revision as of 02:14, 22 May 2010
- See also changes related to Cryptography, or pages that link to Cryptography or to this page or whose text contains "Cryptography".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Cryptology [r]: The theory and practice of protecting the content of communications, and of defeating the protective measures [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
- Privacy [r]: Add brief definition or description
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Alphabetic substitution [r]: Add brief definition or description
- Authenticator [r]: Add brief definition or description
- Bulk encryption [r]: The encipherment of all traffic on a digital transmission medium, without awareness of multiplexed channels, data link protocols, etc., in the medium. [e]
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Code (cryptography) [r]: A means of substituting, for the linguistically meaningful symbols of plaintext composed of words or other symbols meaningful to humans, into inherently meaningless numbers, letters, or words that make no sense to a recipient who is not in possession of a codebook or other means of reversing the substitution of symbols [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Enigma machine [r]: The primary high-security cryptographic communications security machine of Nazi Germany. Unknown to the Germans, it had been substantially cryptanalyzed by the British Government Code and Cipher School, with French, Polish, and U.S. help. [e]
- Feistel cipher [r]: Add brief definition or description
- William Friedman [r]: Add brief definition or description
- Hagelin machine [r]: Add brief definition or description
- Internet Key Exchange [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
- Key generation (cryptographic) [r]: Add brief definition or description
- Key management (cryptographic) [r]: Add brief definition or description
- One-time pad [r]: Add brief definition or description
- Playfair cipher [r]: Add brief definition or description
- Pretty Good Privacy [r]: Add brief definition or description
- PURPLE machine [r]: Add brief definition or description
- Session key [r]: Add brief definition or description
- SIGABA [r]: Add brief definition or description
- Quantum cryptography [r]: Add brief definition or description
- Rotor machine [r]: Add brief definition or description
- Vigenère cipher [r]: Add brief definition or description
- Politics of cryptography [r]: Add brief definition or description
- Authentication [r]: Add brief definition or description
- Communications intelligence [r]: Add brief definition or description
- Digital certificate [r]: Add brief definition or description
- Digital signature [r]: Add brief definition or description
- Encapsulating Security Payload [r]: Add brief definition or description
- Extensible Authentication Protocol [r]: Add brief definition or description
- Pseudorandom number [r]: Add brief definition or description
- Public Key Infrastructure [r]: Add brief definition or description
- Secure sockets layer [r]: Add brief definition or description
- Steganography [r]: Add brief definition or description
- Transport layer security [r]: Add brief definition or description
- Unicity distance [r]: Add brief definition or description
- Zero-knowledge protocol [r]: Add brief definition or description