Jump to content

Topics in cryptography: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
removed misspelled sentence which anyway did not serve any function except state the obvious
Line 1: Line 1:
{{portalpar|Cryptography}}
{{portalpar|Cryptography}}


==Classical ciphers==
== Classical ciphers ==
*[[Autokey cipher]]
* [[Autokey cipher]]
*[[Permutation cipher]]
* [[Permutation cipher]]


*[[Polyalphabetic substitution]]
* [[Polyalphabetic substitution]]
**[[Vigenère cipher]]
** [[Vigenère cipher]]


*[[Polygraphic substitution]]
* [[Polygraphic substitution]]
**[[Playfair cipher]] (by [[Charles Wheatstone]])
** [[Playfair cipher]] (by [[Charles Wheatstone]])
**[[Hill cipher]]
** [[Hill cipher]]


*[[Substitution cipher]]s
* [[Substitution cipher]]s
**[[Caesar cipher]]
** [[Caesar cipher]]
***[[ROT13]]
*** [[ROT13]]
**[[Affine cipher]]
** [[Affine cipher]]
**[[Atbash cipher]]
** [[Atbash cipher]]


*[[Transposition cipher]]s
* [[Transposition cipher]]s
**[[Scytale]]
** [[Scytale]]
**[[Grille (cryptography)|Grille]] cipher
** [[Grille (cryptography)|Grille]] cipher
**[[VIC cipher]] (complex hand cypher used by at least one Soviet spy in the early 1950s -- it proved quite secure for the time)
** [[VIC cipher]] (complex hand cypher used by at least one Soviet spy in the early 1950s -- it proved quite secure for the time)


==Famous ciphertexts==
== Famous ciphertexts ==
*See [[List of famous ciphertexts]]
* See [[List of famous ciphertexts]]


==Attacks on classical ciphers==
== Attacks on classical ciphers ==


*[[Frequency analysis (cryptanalysis)|Frequency analysis]]
* [[Frequency analysis (cryptanalysis)|Frequency analysis]]
*[[Contact analysis (cryptanalysis)|Contact analysis]]
* [[Contact analysis (cryptanalysis)|Contact analysis]]
*[[Kasiski examination]]
* [[Kasiski examination]]
*[[Index of coincidence]]
* [[Index of coincidence]]


==Modern algorithms, methods evaluation and selection projects==
== Modern algorithms, methods evaluation and selection projects ==
===Standards organizations===
=== Standards organizations ===
*the [[Federal Information Processing Standard]]s Publication program (run by [[NIST]] to produce standards in many areas to guide operations of the US Federal government; many [[Federal Information Processing Standard|FIPS]] Pubs are cryptography related, ongoing)
* the [[Federal Information Processing Standard]]s Publication program (run by [[NIST]] to produce standards in many areas to guide operations of the US Federal government; many [[Federal Information Processing Standard|FIPS]] Pubs are cryptography related, ongoing)
*the [[American National Standards Institute|ANSI]] standardization process (produces many standards in many areas; some are cryptography related, ongoing) <!--***we need a list here! -- help, please *** -->
* the [[American National Standards Institute|ANSI]] standardization process (produces many standards in many areas; some are cryptography related, ongoing) <!--***we need a list here! -- help, please *** -->
*[[International Organization for Standardization| ISO]] standardization process (produces many standards in many areas; some are cryptography related, ongoing) <!-- ***we need a list here! -- help, please ***) -->
* [[International Organization for Standardization|ISO]] standardization process (produces many standards in many areas; some are cryptography related, ongoing) <!-- ***we need a list here! -- help, please ***) -->
*[[IEEE]] standardization process (produces many standards in many areas; some are cryptography related, ongoing) <!-- ***we need a list here! -- help, please ***) -->
* [[IEEE]] standardization process (produces many standards in many areas; some are cryptography related, ongoing) <!-- ***we need a list here! -- help, please ***) -->
*[[IETF]] standardization process (produces many standards (called [[Request for Comments|RFC]]s) in many areas; some are cryptography related, ongoing) <!-- ***we need a list here! -- help, please ***) -->
* [[IETF]] standardization process (produces many standards (called [[Request for Comments|RFCs]]) in many areas; some are cryptography related, ongoing) <!-- ***we need a list here! -- help, please ***) -->
See [[Cryptography standards]]
See [[Cryptography standards]]


===Cryptographic organizations===
=== Cryptographic organizations ===
*[[NSA]] internal evaluation/selections (NSA is charged with assisting NIST in its cryptographic responsibilities)
* [[NSA]] internal evaluation/selections (NSA is charged with assisting NIST in its cryptographic responsibilities)
*[[GCHQ]] internal evaluation/selections (a division of GCHQ is charged with developing and recommending cryptographic standards for the UK government) <!-- **** we need more information here -- help! **** -->
* [[GCHQ]] internal evaluation/selections (a division of GCHQ is charged with developing and recommending cryptographic standards for the UK government) <!-- **** we need more information here -- help! **** -->
*[[Defence Signals Directorate|DSD]] Australian [[SIGINT]] agency - part of [[ECHELON]]
* [[Defence Signals Directorate|DSD]] Australian [[SIGINT]] agency - part of [[ECHELON]]
*[[Communications Security Establishment]] (CSE) &mdash; Canadian intelligence agency.
* [[Communications Security Establishment]] (CSE) &mdash; Canadian intelligence agency.
<!--*and the same for China, France, Germany, India, Russia, etc-->
<!--*and the same for China, France, Germany, India, Russia, etc-->


===Open efforts===
=== Open efforts ===
*the [[Data Encryption Standard|DES]] selection ([[NIST|NBS]] selection process, ended 1976)
* the [[Data Encryption Standard|DES]] selection ([[NIST|NBS]] selection process, ended 1976)
*the RIPE division of the RACE project (sponsored by the [[European Union]], ended mid-'80s)
* the RIPE division of the RACE project (sponsored by the [[European Union]], ended mid-'80s)
*the [[Advanced Encryption Standard|AES]] competition (a 'break-off' sponsored by [[NIST]]; ended 2001)
* the [[Advanced Encryption Standard|AES]] competition (a 'break-off' sponsored by [[NIST]]; ended 2001)
*the [[NESSIE]] Project (evaluation/selection program sponsored by the [[European Union]]; ended 2002)
* the [[NESSIE]] Project (evaluation/selection program sponsored by the [[European Union]]; ended 2002)
*the [[eSTREAM]] program ([[ECRYPT]]-funded; motivated by the failure of all of the [[stream cipher]]s submitted to [[NESSIE]]; ended 2008)
* the [[eSTREAM]] program ([[ECRYPT]]-funded; motivated by the failure of all of the [[stream cipher]]s submitted to [[NESSIE]]; ended 2008)
*the [[CRYPTREC]] program (Japanese government sponsored evaluation/recommendation project; draft recommendations published 2003)
* the [[CRYPTREC]] program (Japanese government sponsored evaluation/recommendation project; draft recommendations published 2003)
*the [[IETF|Internet Engineering Task Force]] (technical body responsible for Internet standards -- the [[Request for Comments|Request for Comment]] series: ongoing)
* the [[IETF|Internet Engineering Task Force]] (technical body responsible for Internet standards -- the [[Request for Comments|Request for Comment]] series: ongoing)
*the [[CrypTool]] project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)
* the [[CrypTool]] project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)
<!-- ****need a list here, Help, please **** -->
<!-- ****need a list here, Help, please **** -->


Line 107: Line 107:
* [[Elliptic Curve DSA]] ([[NESSIE]] selection digital signature scheme; Certicom Corp); [[CRYPTREC]] recommendation as ANSI X9.62, SEC1)
* [[Elliptic Curve DSA]] ([[NESSIE]] selection digital signature scheme; Certicom Corp); [[CRYPTREC]] recommendation as ANSI X9.62, SEC1)
* [[Schnorr signature]]s
* [[Schnorr signature]]s
* [[RSA|RSA signature]]s
* [[RSA|RSA signatures]]
** [[RSA-PSS]] ([[NESSIE]] selection digital signature scheme; RSA Laboratories); [[CRYPTREC]] recommendation)
** [[RSA-PSS]] ([[NESSIE]] selection digital signature scheme; RSA Laboratories); [[CRYPTREC]] recommendation)
* [[RSASSA-PKCS1]] v1.5 ([[CRYPTREC]] recommendation)
* [[RSASSA-PKCS1]] v1.5 ([[CRYPTREC]] recommendation)
Line 114: Line 114:
* [[Gennaro-Halevi-Rabin signature]]
* [[Gennaro-Halevi-Rabin signature]]
* [[Cramer-Shoup signature]]
* [[Cramer-Shoup signature]]
*[[One-time signature]]s
* [[One-time signature]]s
**[[Lamport signature]]
** [[Lamport signature]]
**[[Bos-Chaum signature]]
** [[Bos-Chaum signature]]
*[[Undeniable signature]]s
* [[Undeniable signature]]s
**[[Chaum-van Antwerpen signature]]
** [[Chaum-van Antwerpen signature]]
*[[Fail-stop signature]]s
* [[Fail-stop signature]]s
*[[Ong-Schnorr-Shamir signature]]
* [[Ong-Schnorr-Shamir signature]]
*[[Birational permutation]]
* [[Birational permutation]]
*[[ESIGN]]
* [[ESIGN]]
** [[ESIGN-D]]
** [[ESIGN-D]]
** [[ESIGN-R]]
** [[ESIGN-R]]
*[[Direct anonymous attestation]]
* [[Direct anonymous attestation]]
*[[NTRUSign]]
* [[NTRUSign]]
*[[SFLASH]] ([[NESSIE]] selection digital signature scheme (esp for smartcard applications and similar); Schlumberger (France))
* [[SFLASH]] ([[NESSIE]] selection digital signature scheme (esp for smartcard applications and similar); Schlumberger (France))
* [[Quartz (cryptography)|Quartz]]
* [[Quartz (cryptography)|Quartz]]


==Key authentication==
== Key authentication ==
*[[Key authentication]]
* [[Key authentication]]
*[[Public key infrastructure]]
* [[Public key infrastructure]]
**[[X.509]]
** [[X.509]]
*[[Public key certificate]]
* [[Public key certificate]]
**[[Certificate authority]]
** [[Certificate authority]]
**[[Certificate revocation list]]
** [[Certificate revocation list]]
*[[ID-based cryptography]]
* [[ID-based cryptography]]
*[[Certificate-based encryption]]
* [[Certificate-based encryption]]
*[[Secure key issuing cryptography]]
* [[Secure key issuing cryptography]]
*[[Certificateless cryptography]]
* [[Certificateless cryptography]]
*[[Hash tree|Merkle tree]]
* [[Hash tree|Merkle tree]]


==Anonymous identification scheme==
== Anonymous identification scheme ==
* [[GPS]] (NESSIE selection anonymous identification scheme; Ecole Normale Supérieure, France Télécom, & La Poste)
* [[GPS]] (NESSIE selection anonymous identification scheme; Ecole Normale Supérieure, France Télécom, & La Poste)


== Secret key algorithms (aka [[symmetric key algorithm]]s) ==
== Secret key algorithms (aka [[symmetric key algorithm]]s) ==
*[[Stream cipher]]s
* [[Stream cipher]]s
** [[A5/1]], [[A5/2]] (cyphers specified for the [[GSM]] cellular telephone standard)
** [[A5/1]], [[A5/2]] (cyphers specified for the [[GSM]] cellular telephone standard)
** [[BMGL]]
** [[BMGL]]
Line 174: Line 174:
** [[WAKE (cipher)|WAKE]]
** [[WAKE (cipher)|WAKE]]


*[[Block cipher]]s
* [[Block cipher]]s
**[[Block cipher modes of operation]]
** [[Block cipher modes of operation]]
**[[Product cipher]]
** [[Product cipher]]
**[[Feistel cipher]] (block cypher design pattern by [[Horst Feistel]])
** [[Feistel cipher]] (block cypher design pattern by [[Horst Feistel]])
**[[Advanced Encryption Standard]] (Rijndael) (128 bit block; [[NIST]] selection for the AES, FIPS 197, 2001 -- by [[Joan Daemen]] and [[Vincent Rijmen]]; [[NESSIE]] selection; [[CRYPTREC]] recommendation)
** [[Advanced Encryption Standard]] (Rijndael) (128 bit block; [[NIST]] selection for the AES, FIPS 197, 2001 -- by [[Joan Daemen]] and [[Vincent Rijmen]]; [[NESSIE]] selection; [[CRYPTREC]] recommendation)
**[[Anubis (cipher)|Anubis]] (128-bit block)
** [[Anubis (cipher)|Anubis]] (128-bit block)
**[[BEAR (cipher)|BEAR]] (block cypher built from stream cypher and hash function, by [[Ross Anderson]])
** [[BEAR (cipher)|BEAR]] (block cypher built from stream cypher and hash function, by [[Ross Anderson]])
**[[Blowfish (cipher)|Blowfish]] (64 bit block; by [[Bruce Schneier]], et al)
** [[Blowfish (cipher)|Blowfish]] (64 bit block; by [[Bruce Schneier]], et al)
**[[Camellia (cipher)|Camellia]] (128 bit block; [[NESSIE]] selection (NTT & Mitsubishi Electric); [[CRYPTREC]] recommendation)
** [[Camellia (cipher)|Camellia]] (128 bit block; [[NESSIE]] selection (NTT & Mitsubishi Electric); [[CRYPTREC]] recommendation)
**[[CAST-128]] ([[CAST5]]) (64 bit block; one of a series of algorithms by [[Carlisle Adams]] and [[Stafford Tavares]], who are insistent (indeed, adamant) that the name is not due to their initials)
** [[CAST-128]] ([[CAST5]]) (64 bit block; one of a series of algorithms by [[Carlisle Adams]] and [[Stafford Tavares]], who are insistent (indeed, adamant) that the name is not due to their initials)
**[[CAST-256]] ([[CAST6]]) (128-bit block; the successor to CAST-128 and a candidate for the AES competition)
** [[CAST-256]] ([[CAST6]]) (128-bit block; the successor to CAST-128 and a candidate for the AES competition)
**[[CIPHERUNICORN-A]] (128 bit block; [[CRYPTREC]] recommendation)
** [[CIPHERUNICORN-A]] (128 bit block; [[CRYPTREC]] recommendation)
**[[CIPHERUNICORN-E]] (64 bit block; [[CRYPTREC]] recommendation (limited))
** [[CIPHERUNICORN-E]] (64 bit block; [[CRYPTREC]] recommendation (limited))
**[[CMEA (cipher)|CMEA]] &mdash; cipher used in US cellphones, found to have weaknesses.
** [[CMEA (cipher)|CMEA]] &mdash; cipher used in US cellphones, found to have weaknesses.
**[[CS-Cipher]] (64 bit block)
** [[CS-Cipher]] (64 bit block)
**[[Data Encryption Standard]] (DES) (64 bit block; FIPS 46-3, 1976)
** [[Data Encryption Standard]] (DES) (64 bit block; FIPS 46-3, 1976)
**[[DEAL]] &mdash; an AES candidate derived from DES
** [[DEAL]] &mdash; an AES candidate derived from DES
**[[DES-X]] A variant of DES to increase the key size.
** [[DES-X]] A variant of DES to increase the key size.
**[[FEAL]]
** [[FEAL]]
**[[GDES]] &mdash; a [[Data Encryption Standard|DES]] variant designed to speed up encryption.
** [[GDES]] &mdash; a [[Data Encryption Standard|DES]] variant designed to speed up encryption.
**[[Grand Cru (cipher)|Grand Cru]] (128 bit block)
** [[Grand Cru (cipher)|Grand Cru]] (128 bit block)
**[[Hierocrypt-3]] (128 bit block; [[CRYPTREC]] recommendation))
** [[Hierocrypt-3]] (128 bit block; [[CRYPTREC]] recommendation))
**[[Hierocrypt-L1]] (64 bit block; [[CRYPTREC]] recommendation (limited))
** [[Hierocrypt-L1]] (64 bit block; [[CRYPTREC]] recommendation (limited))
**[[IDEA NXT]] (project name FOX, 64-bit and 128-bit block family; Mediacrypt (Switzerland); by [[Pascal Junod]] & [[Serge Vaudenay]] of Swiss Institute of Technology Lausanne)
** [[IDEA NXT]] (project name FOX, 64-bit and 128-bit block family; Mediacrypt (Switzerland); by [[Pascal Junod]] & [[Serge Vaudenay]] of Swiss Institute of Technology Lausanne)
**[[International Data Encryption Algorithm]] (IDEA) (64 bit block -- [[James Massey]] & [[X Lai]] of [[ETH]] Zurich)
** [[International Data Encryption Algorithm]] (IDEA) (64 bit block -- [[James Massey]] & [[X Lai]] of [[ETH]] Zurich)
**[[Iraqi Block Cipher]] (IBC)
** [[Iraqi Block Cipher]] (IBC)
**[[KASUMI (block cipher)|KASUMI]] (64-bit block; based on [[MISTY1]], adopted for next generation [[W-CDMA]] [[cellular phone]] security)
** [[KASUMI (block cipher)|KASUMI]] (64-bit block; based on [[MISTY1]], adopted for next generation [[W-CDMA]] [[cellular phone]] security)
**[[KHAZAD]] (64-bit block designed by Barretto and [[Vincent Rijmen|Rijmen]])
** [[KHAZAD]] (64-bit block designed by Barretto and [[Vincent Rijmen|Rijmen]])
**[[Khufu and Khafre]] (64-bit block ciphers)
** [[Khufu and Khafre]] (64-bit block ciphers)
**[[LION]] (block cypher built from stream cypher and hash function, by [[Ross Anderson]])
** [[LION]] (block cypher built from stream cypher and hash function, by [[Ross Anderson]])
**[[LOKI|LOKI89/91]] (64-bit block ciphers)
** [[LOKI|LOKI89/91]] (64-bit block ciphers)
**[[LOKI97]] (128-bit block cipher, AES candidate)
** [[LOKI97]] (128-bit block cipher, AES candidate)
**[[Lucifer (cipher)|Lucifer]] (by Tuchman et al of [[IBM]], early 1970s; modified by [[NSA]]/[[NBS]] and released as [[Data Encryption Standard|DES]])
** [[Lucifer (cipher)|Lucifer]] (by Tuchman et al of [[IBM]], early 1970s; modified by [[NSA]]/[[NBS]] and released as [[Data Encryption Standard|DES]])
**[[MAGENTA]] (AES candidate)
** [[MAGENTA]] (AES candidate)
**[[Mars (cipher)|Mars]] (AES finalist, by [[Don Coppersmith]] et al)
** [[Mars (cipher)|Mars]] (AES finalist, by [[Don Coppersmith]] et al)
**[[MISTY1]] ([[NESSIE]] selection 64-bit block; Mitsubishi Electric (Japan); [[CRYPTREC]] recommendation (limited))
** [[MISTY1]] ([[NESSIE]] selection 64-bit block; Mitsubishi Electric (Japan); [[CRYPTREC]] recommendation (limited))
**[[MISTY2]] (128 bit block: Mitsubishi Electric (Japan))
** [[MISTY2]] (128 bit block: Mitsubishi Electric (Japan))
**[[Nimbus (cipher)|Nimbus]] (64 bit block)
** [[Nimbus (cipher)|Nimbus]] (64 bit block)
**[[NOEKEON]] (128 bit block)
** [[NOEKEON]] (128 bit block)
**[[NUSH]] (variable block length (64 - 256 bits))
** [[NUSH]] (variable block length (64 - 256 bits))
**[[Q (cipher)|Q]] (128 bit block)
** [[Q (cipher)|Q]] (128 bit block)
**[[RC2]] 64-bit block, variable key length.
** [[RC2]] 64-bit block, variable key length.
**[[RC6]] (variable block length; AES finalist, by [[Ron Rivest]] et al)
** [[RC6]] (variable block length; AES finalist, by [[Ron Rivest]] et al)
**[[RC5]] (by [[Ron Rivest]])
** [[RC5]] (by [[Ron Rivest]])
**[[SAFER]] (variable block length)
** [[SAFER]] (variable block length)
**[[SC2000]] (128 bit block; [[CRYPTREC]] recommendation)
** [[SC2000]] (128 bit block; [[CRYPTREC]] recommendation)
**[[Serpent (cipher)|Serpent]] (128 bit block; AES finalist by [[Ross Anderson]], [[Eli Biham]], [[Lars Knudsen]])
** [[Serpent (cipher)|Serpent]] (128 bit block; AES finalist by [[Ross Anderson]], [[Eli Biham]], [[Lars Knudsen]])
**[[SHACAL-1]] (160-bit block)
** [[SHACAL-1]] (160-bit block)
**[[SHACAL-2]] (256-bit block cypher; [[NESSIE]] selection Gemplus (France))
** [[SHACAL-2]] (256-bit block cypher; [[NESSIE]] selection Gemplus (France))
**[[Shark (cipher)|Shark]] (grandfather of [[Rijndael]]/[[Advanced Encryption Standard|AES]], by Daemen and Rijmen)
** [[Shark (cipher)|Shark]] (grandfather of [[Rijndael]]/[[Advanced Encryption Standard|AES]], by Daemen and Rijmen)
**[[Square (cipher)|Square]] (father of [[Rijndael]]/[[Advanced Encryption Standard|AES]], by Daemen and Rijmen)
** [[Square (cipher)|Square]] (father of [[Rijndael]]/[[Advanced Encryption Standard|AES]], by Daemen and Rijmen)
**[[3-Way]] (96 bit block by [[Joan Daemen]])
** [[3-Way]] (96 bit block by [[Joan Daemen]])
**[[Tiny Encryption Algorithm|TEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])
** [[Tiny Encryption Algorithm|TEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])
**[[Triple DES]] (by [[Walter Tuchman]], leader of the [[Lucifer (cipher)|Lucifer]] design team -- not all triple uses of DES increase security, Tuchman's does; [[CRYPTREC]] recommendation (limited), only when used as in FIPS Pub 46-3)
** [[Triple DES]] (by [[Walter Tuchman]], leader of the [[Lucifer (cipher)|Lucifer]] design team -- not all triple uses of DES increase security, Tuchman's does; [[CRYPTREC]] recommendation (limited), only when used as in FIPS Pub 46-3)
**[[Twofish]] (128 bit block; AES finalist by [[Bruce Schneier]], et al)
** [[Twofish]] (128 bit block; AES finalist by [[Bruce Schneier]], et al)
**[[XTEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])
** [[XTEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])


*Polyalphabetic substitution machine cyphers
* Polyalphabetic substitution machine cyphers
**[[Enigma (machine)|Enigma]] (WWII German rotor cypher machine -- many variants, many user networks for most of the variants)
** [[Enigma (machine)|Enigma]] (WWII German rotor cypher machine -- many variants, many user networks for most of the variants)
** [[Purple code|Purple]] (highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain)
** [[Purple code|Purple]] (highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain)
**[[SIGABA]] (WWII US cypher machine by [[William Friedman]], [[Frank Rowlett]], et al)
** [[SIGABA]] (WWII US cypher machine by [[William Friedman]], [[Frank Rowlett]], et al)
**[[TypeX]] (WWII UK cypher machine)
** [[TypeX]] (WWII UK cypher machine)


*Hybrid code/cypher combinations
* Hybrid code/cypher combinations
**[[JN-25]] (WWII Japanese Navy superencyphered code; many variants)
** [[JN-25]] (WWII Japanese Navy superencyphered code; many variants)
**[[Naval Cypher 3]] (superencrypted code used by the Royal Navy in the 30s and into WWII)
** [[Naval Cypher 3]] (superencrypted code used by the Royal Navy in the 30s and into WWII)


*[[Visual cryptography]]
* [[Visual cryptography]]


==[[Classified]] cryptography ([[United States|U.S.]])==
== [[Classified]] cryptography ([[United States|U.S.]]) ==
*[[EKMS]] [[NSA]]'s Electronic Key Management System
* [[EKMS]] [[NSA]]'s Electronic Key Management System
*[[FNBDT]] [[NSA]]'s secure narrow band voice standard
* [[FNBDT]] [[NSA]]'s secure narrow band voice standard
*[[Fortezza]] encryption based on portable crypto token in [[PC Card]] format
* [[Fortezza]] encryption based on portable crypto token in [[PC Card]] format
*[[KW-26]] ROMULUS teletype encryptor (1960s - 1980s)
* [[KW-26]] ROMULUS teletype encryptor (1960s - 1980s)
*[[KY-57]] VINSON tactical radio voice encryption
* [[KY-57]] VINSON tactical radio voice encryption
*[[SINCGARS]] tactical radio with cryptographically controlled frequency hopping
* [[SINCGARS]] tactical radio with cryptographically controlled frequency hopping
*[[STE]] secure telephone
* [[STE]] secure telephone
*[[STU-III]] older secure telephone
* [[STU-III]] older secure telephone
*[[TEMPEST]] prevents compromising emanations
* [[TEMPEST]] prevents compromising emanations
*[[Type 1 product]]s
* [[Type 1 product]]s


==Breaking ciphers==
== Breaking ciphers ==
*[[Passive attack]]
* [[Passive attack]]
*[[Chosen plaintext attack]]
* [[Chosen plaintext attack]]
*[[Chosen ciphertext attack]]
* [[Chosen ciphertext attack]]
*[[Adaptive chosen ciphertext attack]]
* [[Adaptive chosen ciphertext attack]]
*[[Brute force attack]]
* [[Brute force attack]]
**[[Cryptographic key length]]
** [[Cryptographic key length]]
**[[Unicity distance]]
** [[Unicity distance]]
*[[Cryptanalysis]]
* [[Cryptanalysis]]
**[[Meet-in-the-middle attack]]
** [[Meet-in-the-middle attack]]
**[[Differential cryptanalysis]]
** [[Differential cryptanalysis]]
**[[Linear cryptanalysis]]
** [[Linear cryptanalysis]]
**[[Slide attack]] cryptanalysis
** [[Slide attack]] cryptanalysis
**[[Algebraic cryptanalysis]]
** [[Algebraic cryptanalysis]]
**[[XSL attack]]
** [[XSL attack]]
**[[Mod n cryptanalysis]]
** [[Mod n cryptanalysis]]


==Weak keys and password-based cryptography==
== Weak keys and password-based cryptography ==
* [[Brute force attack]]
* [[Brute force attack]]
* [[Dictionary attack]]
* [[Dictionary attack]]
Line 284: Line 284:
* [[Salt (cryptography)|Salt]]
* [[Salt (cryptography)|Salt]]


==Key transport/exchange==
== Key transport/exchange ==
*[[BAN Logic]]
* [[BAN Logic]]
*[[Diffie-Hellman]]
* [[Diffie-Hellman]]
*[[Man-in-the-middle attack]]
* [[Man-in-the-middle attack]]
*[[Needham-Schroeder]]
* [[Needham-Schroeder]]
*[[Offline private key]]
* [[Offline private key]]
*[[Otway-Rees]]
* [[Otway-Rees]]
*[[Trusted paper key]]
* [[Trusted paper key]]
*[[Wide Mouth Frog]]
* [[Wide Mouth Frog]]


== [[Cryptographically secure pseudo-random number generator|Pseudo- and true random number generator]]s ==
== [[Cryptographically secure pseudo-random number generator|Pseudo- and true random number generators]] ==
* [[PRNG]]
* [[PRNG]]
* [[CSPRNG]]
* [[CSPRNG]]
Line 313: Line 313:
* [[Onion routing]]
* [[Onion routing]]


==Legal issues==
== Legal issues ==
*Cryptography as [[free speech]]
* Cryptography as [[free speech]]
**''[[Bernstein v. United States]]''
** ''[[Bernstein v. United States]]''
**''[[Junger v. Daley]]''
** ''[[Junger v. Daley]]''
**[[DeCSS]]
** [[DeCSS]]
**[[Phil Zimmermann]]
** [[Phil Zimmermann]]
*[[Export of cryptography]]
* [[Export of cryptography]]
*[[Key escrow]] and [[Clipper Chip]]
* [[Key escrow]] and [[Clipper Chip]]
*[[Digital Millennium Copyright Act]]
* [[Digital Millennium Copyright Act]]
*[[Digital Rights Management]] (DRM)
* [[Digital Rights Management]] (DRM)
*Cryptography [[patents]]
* Cryptography [[patents]]
**[[RSA]] (now public domain}
** [[RSA]] (now public domain}
**[[David Chaum]] and digital cash
** [[David Chaum]] and digital cash
*[[Cryptography and law enforcement]]
* [[Cryptography and law enforcement]]
**[[Telephone tapping|Wiretap]]s
** [[Telephone tapping|Wiretaps]]
**[[Espionage]]
** [[Espionage]]
*[[Cryptography laws in different nations]]
* [[Cryptography laws in different nations]]
**[[Official Secrets Act]] ([[United Kingdom]])
** [[Official Secrets Act]] ([[United Kingdom]])
**[[Regulation of Investigatory Powers Act 2000]] ([[United Kingdom]])
** [[Regulation of Investigatory Powers Act 2000]] ([[United Kingdom]])


== Terminology ==
== Terminology ==
Line 342: Line 342:
* [[Alice and Bob]]
* [[Alice and Bob]]


==Books and publications==
== Books and publications ==
* [[Books on cryptography]]
* [[Books on cryptography]]
* [[List of important publications in computer science#Cryptography|Important publications in cryptography]]
* [[List of important publications in computer science#Cryptography|Important publications in cryptography]]


==Cryptographers==
== Cryptographers ==
* See [[List of cryptographers]]
* See [[List of cryptographers]]


==Uses of cryptographic techniques==
== Uses of cryptographic techniques ==
*[[Commitment scheme]]s
* [[Commitment scheme]]s
*[[Secure multiparty computation]]s
* [[Secure multiparty computation]]s
*[[Electronic voting]]
* [[Electronic voting]]
*[[Authentication]]
* [[Authentication]]
*[[Digital signature]]s
* [[Digital signature]]s
*[[Cryptographic engineering]]
* [[Cryptographic engineering]]
*[[Crypto system]]s
* [[Crypto system]]s


== Robustness properties ==
== Robustness properties ==
*[[Provable security]]
* [[Provable security]]
*[[Random oracle|Random oracle model]]
* [[Random oracle|Random oracle model]]
*[[Ciphertext indistinguishability]]
* [[Ciphertext indistinguishability]]
*[[Semantic security]]
* [[Semantic security]]
*[[Malleability (cryptography)|Malleability]]
* [[Malleability (cryptography)|Malleability]]


== Miscellaneous ==
== Miscellaneous ==
*[[Ban (information)]]
* [[Ban (information)]]
*[[ECHELON|Echelon]]
* [[ECHELON|Echelon]]
*[[Espionage]]
* [[Espionage]]
*[[IACR]]
* [[IACR]]
*[[Ultra]]
* [[Ultra]]
*[[Security engineering]]
* [[Security engineering]]
*[[SIGINT]]
* [[SIGINT]]
*[[Steganography]]
* [[Steganography]]
*[[Cryptographers]]
* [[Cryptographers]]
*[[Secure Sockets Layer|SSL]]
* [[Secure Sockets Layer|SSL]]
*[[Quantum cryptography]]
* [[Quantum cryptography]]
*[[Kish cypher]]
* [[Kish cypher]]
*[[Crypto-anarchism]]
* [[Crypto-anarchism]]
*[[Cypherpunk]]
* [[Cypherpunk]]
*[[Key escrow]]
* [[Key escrow]]
*[[Zero-knowledge proof]]s
* [[Zero-knowledge proof]]s
*[[Blind signature]]
* [[Blind signature]]
*[[Blinding (cryptography)]]
* [[Blinding (cryptography)]]
*[[Digital timestamping]]
* [[Digital timestamping]]
*[[Secret sharing]]
* [[Secret sharing]]
*[[Trusted operating system]]s
* [[Trusted operating system]]s
*[[Trusted paper key]]
* [[Trusted paper key]]
*[[Japanese cryptology from the 1500s to Meiji]]
* [[Japanese cryptology from the 1500s to Meiji]]


== Free / open-source cryptosystems (ie, algorithms + protocols + system design) ==
== Free / open-source cryptosystems (ie, algorithms + protocols + system design) ==
*[[Pretty Good Privacy|PGP]] (a name for any of several related crypto systems, some of which, beginning with the acquisition of the name by Network Associates, have not been [[Free Software]] in the GNU sense)
* [[Pretty Good Privacy|PGP]] (a name for any of several related crypto systems, some of which, beginning with the acquisition of the name by Network Associates, have not been [[Free Software]] in the GNU sense)
*[[FileCrypt]] (an open source/commercial command line version of PGP from Veridis of Denmark, see [[Pretty Good Privacy|PGP]])
* [[FileCrypt]] (an open source/commercial command line version of PGP from Veridis of Denmark, see [[Pretty Good Privacy|PGP]])
*[[GNU Privacy Guard|GPG]] (an open source implementation of the [[OpenPGP]] [[IETF]] standard crypto system)
* [[GNU Privacy Guard|GPG]] (an open source implementation of the [[OpenPGP]] [[IETF]] standard crypto system)
*[[Secure Shell|SSH]] (Secure SHell implementing cryptographically protected variants of several common Unix utilities, First developed as open source in Finland by [[Tatu Ylönen]]. There is now [[OpenSSH]], an open source implementation supporting both SSH v1 and SSH v2 protocols. There are also commercial implementations.
* [[Secure Shell|SSH]] (Secure SHell implementing cryptographically protected variants of several common Unix utilities, First developed as open source in Finland by [[Tatu Ylönen]]. There is now [[OpenSSH]], an open source implementation supporting both SSH v1 and SSH v2 protocols. There are also commercial implementations.
*[[IPsec]] (Internet Protocol Security [[IETF]] standard, a mandatory component of the [[IPv6]] IETF standard)
* [[IPsec]] (Internet Protocol Security [[IETF]] standard, a mandatory component of the [[IPv6]] IETF standard)
*[[Free S/WAN]] (an open source implementation of IPsec)
* [[Free S/WAN]] (an open source implementation of IPsec)
*[[CrypTool]] project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)
* [[CrypTool]] project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)


{{Crypto navbox}}
{{Crypto navbox}}
Line 403: Line 403:
[[Category:Cryptography]]
[[Category:Cryptography]]


[[fr:Liste des articles sur la cryptologie]]
[[vi:Các chủ đề trong mật mã học]]
[[vi:Các chủ đề trong mật mã học]]
[[zh:密码学主题列表]]

Revision as of 16:34, 14 April 2009

Classical ciphers

Famous ciphertexts

Attacks on classical ciphers

Modern algorithms, methods evaluation and selection projects

Standards organizations

  • the Federal Information Processing Standards Publication program (run by NIST to produce standards in many areas to guide operations of the US Federal government; many FIPS Pubs are cryptography related, ongoing)
  • the ANSI standardization process (produces many standards in many areas; some are cryptography related, ongoing)
  • ISO standardization process (produces many standards in many areas; some are cryptography related, ongoing)
  • IEEE standardization process (produces many standards in many areas; some are cryptography related, ongoing)
  • IETF standardization process (produces many standards (called RFCs) in many areas; some are cryptography related, ongoing)

See Cryptography standards

Cryptographic organizations

  • NSA internal evaluation/selections (NSA is charged with assisting NIST in its cryptographic responsibilities)
  • GCHQ internal evaluation/selections (a division of GCHQ is charged with developing and recommending cryptographic standards for the UK government)
  • DSD Australian SIGINT agency - part of ECHELON
  • Communications Security Establishment (CSE) — Canadian intelligence agency.

Open efforts

  • the DES selection (NBS selection process, ended 1976)
  • the RIPE division of the RACE project (sponsored by the European Union, ended mid-'80s)
  • the AES competition (a 'break-off' sponsored by NIST; ended 2001)
  • the NESSIE Project (evaluation/selection program sponsored by the European Union; ended 2002)
  • the eSTREAM program (ECRYPT-funded; motivated by the failure of all of the stream ciphers submitted to NESSIE; ended 2008)
  • the CRYPTREC program (Japanese government sponsored evaluation/recommendation project; draft recommendations published 2003)
  • the Internet Engineering Task Force (technical body responsible for Internet standards -- the Request for Comment series: ongoing)
  • the CrypTool project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)

Cryptographic hash functions (message digest algorithms)

Public key / private key encryption algorithms (aka asymmetric key algorithms)

Public key / private key signature algorithms

Key authentication

Anonymous identification scheme

  • GPS (NESSIE selection anonymous identification scheme; Ecole Normale Supérieure, France Télécom, & La Poste)

Secret key algorithms (aka symmetric key algorithms)

  • Polyalphabetic substitution machine cyphers
    • Enigma (WWII German rotor cypher machine -- many variants, many user networks for most of the variants)
    • Purple (highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain)
    • SIGABA (WWII US cypher machine by William Friedman, Frank Rowlett, et al)
    • TypeX (WWII UK cypher machine)
  • Hybrid code/cypher combinations
    • JN-25 (WWII Japanese Navy superencyphered code; many variants)
    • Naval Cypher 3 (superencrypted code used by the Royal Navy in the 30s and into WWII)

Classified cryptography (U.S.)

  • EKMS NSA's Electronic Key Management System
  • FNBDT NSA's secure narrow band voice standard
  • Fortezza encryption based on portable crypto token in PC Card format
  • KW-26 ROMULUS teletype encryptor (1960s - 1980s)
  • KY-57 VINSON tactical radio voice encryption
  • SINCGARS tactical radio with cryptographically controlled frequency hopping
  • STE secure telephone
  • STU-III older secure telephone
  • TEMPEST prevents compromising emanations
  • Type 1 products

Breaking ciphers

Weak keys and password-based cryptography

Key transport/exchange

Anonymous communication

Terminology

Books and publications

Cryptographers

Uses of cryptographic techniques

Robustness properties

Miscellaneous

Free / open-source cryptosystems (ie, algorithms + protocols + system design)

  • PGP (a name for any of several related crypto systems, some of which, beginning with the acquisition of the name by Network Associates, have not been Free Software in the GNU sense)
  • FileCrypt (an open source/commercial command line version of PGP from Veridis of Denmark, see PGP)
  • GPG (an open source implementation of the OpenPGP IETF standard crypto system)
  • SSH (Secure SHell implementing cryptographically protected variants of several common Unix utilities, First developed as open source in Finland by Tatu Ylönen. There is now OpenSSH, an open source implementation supporting both SSH v1 and SSH v2 protocols. There are also commercial implementations.
  • IPsec (Internet Protocol Security IETF standard, a mandatory component of the IPv6 IETF standard)
  • Free S/WAN (an open source implementation of IPsec)
  • CrypTool project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)