Cryptography/Related Articles
Jump to navigation
Jump to search
- See also changes related to Cryptography, or pages that link to Cryptography or to this page or whose text contains "Cryptography".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Cryptology [r]: The theory and practice of protecting the content of communications, and of defeating the protective measures [e]
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Alphabetic substitution [r]: Add brief definition or description
- Authenticator [r]: Add brief definition or description
- Bulk encryption [r]: The encipherment of all traffic on a digital transmission medium, without awareness of multiplexed channels, data link protocols, etc., in the medium. [e]
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Code (cryptography) [r]: A means of substituting, for the linguistically meaningful symbols of plaintext composed of words or other symbols meaningful to humans, into inherently meaningless numbers, letters, or words that make no sense to a recipient who is not in possession of a codebook or other means of reversing the substitution of symbols [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Enigma machine [r]: The primary high-security cryptographic communications security machine of Nazi Germany. Unknown to the Germans, it had been substantially cryptanalyzed by the British Government Code and Cipher School, with French, Polish, and U.S. help. [e]
- Feistel cipher [r]: Add brief definition or description
- William Friedman [r]: Add brief definition or description
- Hagelin machine [r]: Add brief definition or description
- Internet Key Exchange [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
- Key generation (cryptographic) [r]: Add brief definition or description
- Key management (cryptographic) [r]: Add brief definition or description
- One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
- Playfair cipher [r]: Add brief definition or description
- Pretty Good Privacy [r]: Add brief definition or description
- PURPLE machine [r]: Add brief definition or description
- Session key [r]: Add brief definition or description
- SIGABA [r]: Add brief definition or description
- Quantum cryptography [r]: Add brief definition or description
- Rotor machine [r]: Add brief definition or description
- Vigenère cipher [r]: Add brief definition or description
- Politics of cryptography [r]: Add brief definition or description
- Authentication [r]: Add brief definition or description
- Communications intelligence [r]: Add brief definition or description
- Digital certificate [r]: Add brief definition or description
- Digital signature [r]: Add brief definition or description
- Encapsulating Security Payload [r]: Add brief definition or description
- Extensible Authentication Protocol [r]: Add brief definition or description
- Pseudorandom number [r]: Add brief definition or description
- Public Key Infrastructure [r]: Add brief definition or description
- Secure sockets layer [r]: Add brief definition or description
- Steganography [r]: Add brief definition or description
- Transport layer security [r]: Add brief definition or description
- Unicity distance [r]: Add brief definition or description
- Zero-knowledge protocol [r]: Add brief definition or description