List of cryptography topics
|
This page aims to alphabetically list articles that are primarily related to cryptography. There is a categorised and (somewhat) annotated list of the same articles in subject groupings at Topics in cryptography; it will probably be more useful to those attempting to make some sense of the field. This page is intended to be useful to those monitoring Wikipedia's coverage of the subject (e.g. for editing or maintenance purposes) by providing an easy way to track changes in the indexed articles by clicking on "Related changes" in the sidebar or the link below:
This list does not necessarily include all cryptography-related articles in the Wikipedia, though there is a concerted effort to keep it so. Nevertheless, if you see an article that should be here, but isn't (or one that shouldn't be here but is), please do update the list accordingly.
Note: this page is also being made somewhat redundant by the new category system. See Category:Cryptography and its subcategories.
See also
- Topics in cryptography — an analytical list of articles and terms.
- Books on cryptography — an annotated list of suggested readings.
- List of cryptographers — an annotated list of cryptographers.
- Important publications in cryptography — some cryptography papers in computer science.
- WikiProject Cryptography — discussion and resources for editing cryptography articles.
Contents: Top - 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Digits and symbols
3-Way -- 40-bit encryption -- 5-UCO --
A
A5/1 -- A5/2 -- Abraham Sinkov -- ABA digital signature guidelines -- Acoustic cryptanalysis -- Adaptive chosen ciphertext attack -- Adaptive chosen plaintext and chosen ciphertext attack -- ADFGVX cipher -- Adi Shamir -- Advanced Access Content System -- Advanced Encryption Standard -- Advanced Encryption Standard process -- Adversary -- AEAD block cipher modes of operation -- Affine cipher -- Agnes Meyer Driscoll -- Akelarre (cipher) -- Al Bhed -- Alan Turing -- Alice and Bob -- AN/CYZ-10 -- Anonymous publication -- Anonymous remailer -- Arlington Hall -- Arne Beurling -- Arthur Scherbius -- Arvid Gerhard Damm -- Asymmetric key algorithm -- Atbash -- Auguste Kerckhoffs -- Authentication -- Authorization certificate -- Autokey cipher -- Avalanche effect -- AxCrypt --
B
Babington Plot -- Baby-step giant-step -- Banburismus -- Bart Preneel -- BATON -- Bazeries cylinder -- Beale ciphers -- Bernstein v. United States -- BID 770 -- Bifid cipher -- Birthday attack -- Bit-flipping attack -- Biuro Szyfrów -- Black Chamber -- Blaise de Vigenère -- Bletchley Park -- Blind credential -- Blinding (cryptography) -- Blind signature -- Block cipher -- Block cipher modes of operation -- Block size (cryptography) -- Blowfish (cipher) -- Blum Blum Shub -- Bomba (cryptography) -- Bombe -- Book cipher -- Books on cryptography -- Boris Hagelin -- Bruce Schneier -- Brute force attack -- Burrows-Abadi-Needham logic --
C
Caesar cipher -- CAcert -- Cardan grille -- CAST-128 -- CAST-256 -- Camellia (cipher) -- Cayley-Purser algorithm -- CCMP -- C-52 -- CD-57 -- Central Security Service -- Cellular Message Encryption Algorithm -- Centre for Applied Cryptographic Research -- Certificate authority -- Certificate-based encryption -- Certificateless cryptography -- Certificate revocation list -- Certificate signing request -- Certification path validation algorithm -- Certicom -- Chaffing and winnowing -- Challenge-response test -- Challenge-response authentication -- Chosen ciphertext attack -- Chosen plaintext attack -- CipherSaber -- Cipherspace -- Ciphertext-only attack -- Ciphertext stealing -- Claude E. Shannon -- Cleartext -- Classical cipher -- Clifford Cocks -- Clipper chip -- CMVP -- Code (cryptography) -- Codebook -- Code talker -- Codress message -- Colossus computer -- Collision attack -- Commitment scheme -- Common Scrambling Algorithm -- Communications security -- Communications Security Establishment -- Communication Theory of Secrecy Systems -- Computational Diffie-Hellman assumption -- Computer insecurity -- Computer surveillance -- COMSEC equipment -- Confidentiality -- Confusion and diffusion -- Content-scrambling system -- Cover (telecommunications) -- Covert channel -- Crib -- CrossCrypt -- Cramer-Shoup system -- Cryptanalysis -- Cryptanalysis of the Enigma -- Cryptanalytic computer -- Cryptex -- CRYPTO -- Crypto AG -- CryptoAPI -- Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age -- Crypto-anarchism -- CryptoBuddy -- Cryptochannel -- Cryptogram -- Cryptographic engineering -- Cryptographic hash function -- Cryptographic Message Syntax -- Cryptographic protocol -- Cryptographically secure pseudo-random number generator -- Cryptographically strong -- Cryptographie indéchiffrable -- Cryptography -- Cryptography in Japan -- Cryptography newsgroups -- Cryptography standards -- Cryptologia -- Cryptology ePrint Archive -- Cryptomathic -- Cryptome -- Cryptonomicon -- CryptoStick -- Crypto-society -- Cryptosystem -- CRYPTREC -- Cypherpunk --
D
Daniel J. Bernstein -- Data Encryption Standard -- Datagram Transport Layer Security -- David Chaum -- David Kahn -- David Wagner -- David Wheeler -- DEAL -- Decipherment -- Decrypt -- DeCSS -- Decisional Diffie-Hellman assumption -- Defence Signals Directorate -- Delegated Path Discovery -- Delegated Path Validation -- Deniable encryption -- Derek Taunt -- DES-X -- DES supplementary material -- Dictionary attack -- Differential cryptanalysis -- Differential power analysis -- Diffie-Hellman key exchange -- DigiCipher 2 -- Digital Fortress -- Digital rights management -- Digital signature -- Digital Signature Algorithm -- Digital timestamping -- Dilly Knox -- Dining cryptographers protocol -- Diplomatic bag -- Direct anonymous attestation -- Discrete logarithm -- Distributed.net -- Dmitry Sklyarov -- DomainKeys -- Don Coppersmith -- Dorabella Cipher -- DRYAD --
E
EAP-SIM -- ECHELON -- ECRYPT -- Edward Hebern -- Edward Travis -- EFF DES cracker -- EFS -- EKMS -- Electronic money -- Electronic signature -- Electronic voting -- ElGamal encryption -- Eli Biham -- Elizebeth Friedman -- Elliptic curve cryptography -- Elliptic Curve DSA -- Encrypted function -- Encrypted key exchange -- Encryption -- Enigma machine -- Enigma rotor details -- Enigmail -- Entrust -- Étienne Bazeries -- Existential forgery -- Export of cryptography -- Extensible Authentication Protocol --
F
FEAL -- Feistel cipher -- Felix Delastelle -- Fialka -- Financial cryptography -- FIPS 140 -- FIREFLY -- FISH (cipher) -- Fish (cryptography) -- FNBDT -- Fortezza -- Fortuna (PRNG) -- Four-square cipher -- Fractal cryptography -- Frank A. Stevenson -- Frank Rowlett -- Frequency analysis -- Friedrich Kasiski -- Fritz-chip -- FROG --
G
Garble -- Gardening (cryptanalysis) -- GDES -- George Scovell -- Gilbert Vernam -- GMR (cryptography) -- GNU Privacy Guard -- GnuTLS -- GOST -- Government Communications Headquarters -- Great Cipher --
H
H.235 -- Hans-Thilo Schmidt -- Hard core predicate -- Hardware random number generator -- Harold Keen -- Harvest (computer) -- HAS-160 -- Hashcash -- HAVAL -- HC-9 -- Hebern rotor machine -- Helix (cipher) -- Henryk Zygalski -- Herbert Yardley -- High-Bandwidth Digital Content Protection -- Hill cipher -- History of cryptography -- HMAC -- Horst Feistel -- HTTPS -- Hugo Hadwiger -- Hushmail -- Hyperelliptic curve cryptography -- HX-63 --
I
Ian Goldberg -- IBM 4758 -- ICE (cipher) -- ID-based cryptography -- Identification friend or foe -- IEEE 802.11i -- IEEE P1363 -- I. J. Good -- Illegal prime -- Index of coincidence -- Information security -- Information theoretic security -- Initialization vector -- Integer factorization -- International Association for Cryptologic Research -- Information leakage -- International Data Encryption Algorithm -- Internet key exchange -- Internet Security Association and Key Management Protocol -- Invisible ink -- IPsec -- Iraqi block cipher -- ISAAC (cipher) --
J
JADE -- James Ellis -- Java Cryptography Architecture -- Jefferson disk -- Jerzy Rozycki -- JN-25 -- Joan Daemen -- Johannes Trithemius -- John Tiltman -- Joseph Rochefort -- Joseph Mauborgne -- Josef Pieprzyk -- Journal of Cryptology --
K
Kasiski examination -- KASUMI -- KCDSA -- Kerberos (protocol) -- Kerckhoffs' law -- Key-agreement protocol -- Key authentication -- Key (cryptography) -- Key derivation function -- Key distribution center -- Key escrow -- Key exchange -- Key generation -- Key management -- Key schedule -- Key server -- Key signing party -- Key size -- KG-84 -- KHAZAD -- Khufu and Khafre -- KL-7 -- Knapsack problem -- Known-plaintext attack -- KOV-14 -- Kryha -- Kryptos -- KSD-64 -- KW-26 -- KW-37 -- KY-57 --
L
Lars Knudsen -- Laurance Safford -- LEAP (encryption) -- Le chiffre indéchiffrable -- Leo Marks -- Leonard Adleman -- Leone Battista Alberti -- Leo Rosen -- LibTom Project -- Linear cryptanalysis -- Linear feedback shift register -- Link encryption -- List of cryptographers -- List of cryptographic key types -- List of cryptography topics -- List of famous ciphertexts -- List of telecommunications encryption terms -- LOKI -- LOKI97 -- Lorenz SZ 40/42 -- Louis W. Tordella -- Lucifer (cipher) --
M
M-94 -- M-209 -- M-325 -- MacGuffin (cipher) -- Madryga -- MAGENTA -- Magic (cryptography) -- Malcolm J. Williamson -- Malleability -- Man in the middle attack -- Marian Rejewski -- MARS -- Martin Hellman -- Matt Blaze -- Max Newman -- McEliece -- MD2 -- MD4 -- MD5 -- MD5CRK -- Mean Shortest Distance -- Meet-in-the-middle attack -- Merkle-Hellman -- Merkle's Puzzles -- Message authentication code -- Message forgery -- MI8 -- Microdot -- Mimic function -- Mirror writing -- MISTY1 -- Mitsuru Matsui -- MMB -- Mod n cryptanalysis -- MQV -- MUGI -- MULTI-S01 --
N
National Security Agency -- National Cryptologic Museum -- Needham-Schroeder -- NEMA (machine) -- NESSIE -- Neal Koblitz -- NewDES -- New Zealand Government Communications Security Bureau -- N-Hash -- Nicolas Courtois -- Niels Ferguson -- Nothing up my sleeve number -- NSA encryption algorithms -- NSA encryption systems -- NSAKEY -- NSA Suite B -- NTLM -- NTRUEncrypt -- Null cipher -- Numbers station --
O
Oblivious transfer -- One-key MAC -- One-time pad -- One-time password -- One way function -- Online Certificate Status Protocol -- OP-20-G -- OpenSSH -- OpenSSL -- OTFE -- Otway-Rees --
P
Padding (cryptography) -- Paillier cryptosystem -- Passive attack -- Passphrase -- Password -- Password cracking -- Paul Kocher -- PBKDF2 -- PC Bruno -- Perforated sheets -- Permutation cipher -- Peter Gutmann -- Peter Twinn -- Phil Zimmermann -- Physical security -- Pigpen cipher -- Pike (cipher) -- Piling-up lemma -- Pinwheel (cryptography) -- PKCS -- PKIX -- Plaintext -- Playfair cipher -- PMAC -- Poem code -- Point-to-point tunneling protocol -- Poly1305-AES -- Polyalphabetic cipher -- Polybius square -- Power analysis -- Pretty Good Privacy -- Preimage attack -- Privacy-enhanced Electronic Mail -- Private information retrieval -- Probabilistic encryption -- Product cipher -- Proof-of-work system -- Protected Extensible Authentication Protocol -- Provable security -- Proxy re-encryption -- Pseudo-Hadamard transform -- Pseudonymity -- Pseudorandom number generator -- Public key certificate -- Public-key cryptography -- Public key infrastructure -- PURPLE --
Q
Quadratic sieve -- Quantum cryptography --
R
Rabin cryptosystem -- Ralph Merkle -- Random number generator attack -- Random oracle -- RC2 -- RC4 -- RC5 -- RC6 -- RED/BLACK concept -- REDOC -- Red Pike -- Regulation of Investigatory Powers Act 2000 -- Reihenschieber -- Related-key attack -- Replay attack -- Residual block termination -- RIPEMD -- Robert Tappan Morris, Sr. -- Ron Rivest -- Room 40 -- Root certificate -- Ross Anderson -- ROT13 -- Rotor machine -- RSA -- RSA-100 -- RSA-110 -- RSA-120 -- RSA-129 -- RSA-130 -- RSA-140 -- RSA-150 -- RSA-155 -- RSA-160 -- RSA-170 -- RSA-180 -- RSA-190 -- RSA-200 -- RSA-210 -- RSA-220 -- RSA-230 -- RSA-232 -- RSA-240 -- RSA-250 -- RSA-260 -- RSA-270 -- RSA-280 -- RSA-290 -- RSA-300 -- RSA-309 -- RSA-310 -- RSA-320 -- RSA-330 -- RSA-340 -- RSA-350 -- RSA-360 -- RSA-370 -- RSA-380 -- RSA-390 -- RSA-400 -- RSA-410 -- RSA-420 -- RSA-430 -- RSA-440 -- RSA-450 -- RSA-460 -- RSA-470 -- RSA-480 -- RSA-490 -- RSA-500 -- RSA-576 -- RSA-617 -- RSA-640 -- RSA-704 -- RSA-768 -- RSA-896 -- RSA-1024 -- RSA-1536 -- RSA-2048 -- RSA Factoring Challenge -- RSA problem -- RSA Security -- Rubber-hose cryptanalysis -- Running key cipher -- Russian copulation --
S
S-1 -- SAFER -- Salt (cryptography) -- SAM card -- SAML -- SAVILLE -- Schnorr group -- Schnorr signature -- Scott Vanstone -- Scrambler -- Scytale -- SEAL (cipher) -- SECG -- Secret broadcast -- Secret decoder ring -- Secrets and Lies -- Secret sharing -- Secure channel -- Secure Communication based on Quantum Cryptography -- Secure copy -- Secure cryptoprocessor -- Secure electronic transaction -- Secure FTP -- Secure key issuing cryptography -- SecureIM -- Secure multiparty computation -- Secure remote password protocol -- Secure shell -- Secure Terminal Equipment -- Secure voice -- SecurID -- Security engineering -- Security protocol notation -- Security through obscurity -- Security token -- SEED -- Self-certifying key -- Self-signed certificate -- Semantic security -- Serpent (cipher) -- Session key -- SHACAL -- SHA hash functions -- Shafi Goldwasser -- SHARK -- Shrinking generator -- Shugborough House inscription -- Side channel attack -- Siemens and Halske T52 -- SIGABA -- SIGINT -- Signals Intelligence Service -- SIGSALY -- Simple public key infrastructure -- Simple XOR cipher -- Skipjack (cipher) -- S/KEY -- Slide attack -- S/MIME -- Snake oil (cryptography) -- Snefru -- Snuffle -- SOBER-128 -- Solitaire (cipher) -- Solomon Kullback -- Square (cipher) -- SSH file transfer protocol -- Ståle Schumacher Ytteborg -- Steganalysis -- Steganography -- Straddling checkerboard -- Stream cipher -- Stream cipher attack -- Strict avalanche criterion -- Strong RSA assumption -- STU-III -- Stunnel -- StunTour -- Substitution box -- Substitution cipher -- Substitution-permutation network -- Superencryption -- Swedish National Defence Radio Establishment -- Symmetric key algorithm -- SYSKEY --
T
Tabula recta -- Taher Elgamal -- Tamper resistance -- TEMPEST -- Thawte -- The Alphabet Cipher -- The Codebreakers -- The Code Book -- The Gold Bug -- The Magic Words are Squeamish Ossifrage -- TICOM -- Tiger (hash) -- Tiger-Tree Hash -- Timing attack -- Tiny Encryption Algorithm -- TKIP -- Tommy Flowers -- Topics in cryptography -- Torus based cryptography -- Traffic analysis -- Traffic-flow security -- Transmission security -- Transport Layer Security -- Transposition cipher -- Trapdoor function -- Trench code -- Trifid cipher -- Triple DES -- TrueCrypt -- Trusted third party -- Turing (cipher) -- TWINKLE -- TWIRL -- Twofish -- Two-square cipher -- Type 1 encryption -- Type 2 encryption -- Type 3 encryption -- Type 4 encryption -- Typex --
U
Ultra -- Undeniable signature -- UMAC -- Unicity distance --
V
VENONA project -- VeriSign -- VIC cipher -- Vigenère cipher -- Vincent Rijmen -- VINSON -- Virtual private network -- Visual cryptography -- Voynich manuscript --
W
WAKE -- WAPI -- Weak key -- Web of trust -- Whitfield Diffie -- WHIRLPOOL -- Wide Mouth Frog -- Wi-Fi Protected Access -- William F. Friedman -- William Thomas Tutte -- Wired Equivalent Privacy -- World War II cryptography -- WTLS --
X
X.509 -- XDH Assumption -- Xiaoyun Wang -- XML Signature -- XSL attack -- XTEA --
Y
Yarrow algorithm -- Yuliang Zheng --
Z
Zero-knowledge proof -- Zeroisation -- Zimmermann Telegram -- Zimmermann-Sassaman key-signing protocol --