Cryptography/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Howard C. Berkowitz
(First rearrangement)
Line 1: Line 1:
{{subpages}}
{{subpages}}
{{TOC|right}}
==Parent topics==
==Parent topics==
{{r|Information security}}
{{r|Information security}}
{{r|Cryptology}}
{{r|Cryptology}}
 
{{r|Information theory}}
{{r|Signals intelligence}}
{{r|Communications intelligence||**}}
==Subtopics==
==Subtopics==
{{r|Advanced Encryption Standard}}
===Modes of encryption===
{{r|Alphabetic substitution}}
{{r|Authenticator}}
{{r|Bulk encryption}}
{{r|Bulk encryption}}
{{r|Message encryption}}
{{r|IPsec}}
{{r|Secure Sockets Layer}}
{{r|Transport Layer Security}}
===Ciphers===
{{r|Cipher}}
{{r|Cipher}}
{{r|Code (cryptography)}}
{{r|Alphabetic substitution}}
{{r|Cryptanalysis}}
{{r|Advanced Encryption Standard}}
{{r|Data Encryption Standard}}
{{r|Data Encryption Standard}}
{{r|Diffie-Hellman}}
{{r|Diffie-Hellman}}
{{r|Enigma machine}}
{{r|Enigma machine}}
{{r|Feistel cipher}}
{{r|Feistel cipher}}
{{r|William Friedman}}
{{r|Hagelin machine}}
{{r|Hagelin machine}}
{{r|Internet Key Exchange}}
{{r|IPsec}}
{{r|Key generation (cryptographic)}}
{{r|Key management (cryptographic)}}
{{r|One-time pad}}
{{r|One-time pad}}
{{r|Playfair cipher}}
{{r|Playfair cipher}}
{{r|Pretty Good Privacy}}
{{r|Pretty Good Privacy}}
{{r|Rotor machine}}
{{r|Vigenère cipher}}
{{r|PURPLE machine}}
{{r|PURPLE machine}}
{{r|Session key}}
{{r|SIGABA}}
{{r|SIGABA}}
{{r|Quantum cryptography}}
{{r|Quantum cryptography}}
{{r|Rotor machine}}
{{r|TACLANE}}
{{r|Vigenère cipher}}
{{r|FASTLANE}}
===Codes===
{{r|Code (cryptography)}}
===Cryptanalysis===
{{r|Cryptanalysis}}
===Key management===
{{r|Internet Key Exchange}}
{{r|Key generation (cryptographic)}}
{{r|Key management (cryptographic)}}
{{r|Session key}}


===Personalities===
{{r|Claude Shannon}}
{{r|William Friedman}}
{{r|Auguste Kerckhoffs}}
==Other related topics==
==Other related topics==
{{r|politics of cryptography}}
{{r|politics of cryptography}}
{{r|Information theory}}
{{r|Privacy}}
{{r|Privacy}}
{{r|Steganography}}
{{r|Covert channel}}
===Authentication===
{{r|Authentication}}
{{r|Authentication}}
{{r|Communications intelligence}}
{{r|Digital certificate}}
{{r|Digital certificate}}
{{r|Digital signature}}
{{r|Digital signature}}
{{r|Encapsulating Security Payload}}
{{r|Extensible Authentication Protocol}}
{{r|Extensible Authentication Protocol}}
{{r|Pseudorandom number}}
{{r|Public Key Infrastructure}}
{{r|Public Key Infrastructure}}
{{r|Secure sockets layer}}
===Mathematical principles===
{{r|Steganography}}
{{r|Random number}}
{{r|Transport layer security}}
{{r|Unicity distance}}
{{r|Unicity distance}}
{{r|Zero-knowledge protocol}}
{{r|Zero-knowledge protocol}}

Revision as of 18:48, 22 May 2010

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Cryptography.
See also changes related to Cryptography, or pages that link to Cryptography or to this page or whose text contains "Cryptography".

Parent topics

Subtopics

Modes of encryption

Ciphers

Codes

Cryptanalysis

Key management

Personalities

Other related topics

Authentication

Mathematical principles