Jump to content

Topics in cryptography: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
DumZiBoT (talk | contribs)
m clean up- spelling "et al." and gen fixes using AWB
Line 22: Line 22:
** [[Scytale]]
** [[Scytale]]
** [[Grille (cryptography)|Grille]] cipher
** [[Grille (cryptography)|Grille]] cipher
** [[VIC cipher]] (complex hand cypher used by at least one Soviet spy in the early 1950s -- it proved quite secure for the time)
** [[VIC cipher]] (complex hand cypher used by at least one Soviet spy in the early 1950s—it proved quite secure for the time)


== Famous ciphertexts ==
== Famous ciphertexts ==
Line 57: Line 57:
* the [[eSTREAM]] program ([[ECRYPT]]-funded; motivated by the failure of all of the [[stream cipher]]s submitted to [[NESSIE]]; ended 2008)
* the [[eSTREAM]] program ([[ECRYPT]]-funded; motivated by the failure of all of the [[stream cipher]]s submitted to [[NESSIE]]; ended 2008)
* the [[CRYPTREC]] program (Japanese government sponsored evaluation/recommendation project; draft recommendations published 2003)
* the [[CRYPTREC]] program (Japanese government sponsored evaluation/recommendation project; draft recommendations published 2003)
* the [[IETF|Internet Engineering Task Force]] (technical body responsible for Internet standards -- the [[Request for Comments|Request for Comment]] series: ongoing)
* the [[IETF|Internet Engineering Task Force]] (technical body responsible for Internet standards—the [[Request for Comments|Request for Comment]] series: ongoing)
* the [[CrypTool]] project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)
* the [[CrypTool]] project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)
<!-- ****need a list here, Help, please **** -->
<!-- ****need a list here, Help, please **** -->
Line 75: Line 75:
** [[SHA-512]] ([[NESSIE]] selection hash function, FIPS 180-2, 512 bit digest; [[CRYPTREC]] recommendation)
** [[SHA-512]] ([[NESSIE]] selection hash function, FIPS 180-2, 512 bit digest; [[CRYPTREC]] recommendation)
* [[RIPEMD-160]] (developed in Europe for the RIPE project, 160-bit digest;[[CRYPTREC]] recommendation (limited))
* [[RIPEMD-160]] (developed in Europe for the RIPE project, 160-bit digest;[[CRYPTREC]] recommendation (limited))
* [[Tiger (hash)|Tiger]] (by [[Ross Anderson]] et al)
* [[Tiger (hash)|Tiger]] (by [[Ross Anderson]] et al.)
* [[Snefru (cryptography)|Snefru]]
* [[Snefru (cryptography)|Snefru]]
* [[Whirlpool (algorithm)|Whirlpool]] ([[NESSIE]] selection hash function, Scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium))
* [[Whirlpool (algorithm)|Whirlpool]] ([[NESSIE]] selection hash function, Scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium))
Line 179: Line 179:
** [[Product cipher]]
** [[Product cipher]]
** [[Feistel cipher]] (block cypher design pattern by [[Horst Feistel]])
** [[Feistel cipher]] (block cypher design pattern by [[Horst Feistel]])
** [[Advanced Encryption Standard]] (Rijndael) (128 bit block; [[NIST]] selection for the AES, FIPS 197, 2001 -- by [[Joan Daemen]] and [[Vincent Rijmen]]; [[NESSIE]] selection; [[CRYPTREC]] recommendation)
** [[Advanced Encryption Standard]] (Rijndael) (128 bit block; [[NIST]] selection for the AES, FIPS 197, 2001—by [[Joan Daemen]] and [[Vincent Rijmen]]; [[NESSIE]] selection; [[CRYPTREC]] recommendation)
** [[Anubis (cipher)|Anubis]] (128-bit block)
** [[Anubis (cipher)|Anubis]] (128-bit block)
** [[BEAR (cipher)|BEAR]] (block cypher built from stream cypher and hash function, by [[Ross Anderson]])
** [[BEAR (cipher)|BEAR]] (block cypher built from stream cypher and hash function, by [[Ross Anderson]])
** [[Blowfish (cipher)|Blowfish]] (64 bit block; by [[Bruce Schneier]], et al)
** [[Blowfish (cipher)|Blowfish]] (64 bit block; by [[Bruce Schneier]], et al.)
** [[Camellia (cipher)|Camellia]] (128 bit block; [[NESSIE]] selection (NTT & Mitsubishi Electric); [[CRYPTREC]] recommendation)
** [[Camellia (cipher)|Camellia]] (128 bit block; [[NESSIE]] selection (NTT & Mitsubishi Electric); [[CRYPTREC]] recommendation)
** [[CAST-128]] ([[CAST5]]) (64 bit block; one of a series of algorithms by [[Carlisle Adams]] and [[Stafford Tavares]], who are insistent (indeed, adamant) that the name is not due to their initials)
** [[CAST-128]] ([[CAST5]]) (64 bit block; one of a series of algorithms by [[Carlisle Adams]] and [[Stafford Tavares]], who are insistent (indeed, adamant) that the name is not due to their initials)
Line 207: Line 207:
** [[LOKI|LOKI89/91]] (64-bit block ciphers)
** [[LOKI|LOKI89/91]] (64-bit block ciphers)
** [[LOKI97]] (128-bit block cipher, AES candidate)
** [[LOKI97]] (128-bit block cipher, AES candidate)
** [[Lucifer (cipher)|Lucifer]] (by Tuchman et al of [[IBM]], early 1970s; modified by [[NSA]]/[[NBS]] and released as [[Data Encryption Standard|DES]])
** [[Lucifer (cipher)|Lucifer]] (by Tuchman et al. of [[IBM]], early 1970s; modified by [[NSA]]/[[NBS]] and released as [[Data Encryption Standard|DES]])
** [[MAGENTA]] (AES candidate)
** [[MAGENTA]] (AES candidate)
** [[Mars (cipher)|Mars]] (AES finalist, by [[Don Coppersmith]] et al)
** [[Mars (cipher)|Mars]] (AES finalist, by [[Don Coppersmith]] et al.)
** [[MISTY1]] ([[NESSIE]] selection 64-bit block; Mitsubishi Electric (Japan); [[CRYPTREC]] recommendation (limited))
** [[MISTY1]] ([[NESSIE]] selection 64-bit block; Mitsubishi Electric (Japan); [[CRYPTREC]] recommendation (limited))
** [[MISTY2]] (128 bit block: Mitsubishi Electric (Japan))
** [[MISTY2]] (128 bit block: Mitsubishi Electric (Japan))
Line 217: Line 217:
** [[Q (cipher)|Q]] (128 bit block)
** [[Q (cipher)|Q]] (128 bit block)
** [[RC2]] 64-bit block, variable key length.
** [[RC2]] 64-bit block, variable key length.
** [[RC6]] (variable block length; AES finalist, by [[Ron Rivest]] et al)
** [[RC6]] (variable block length; AES finalist, by [[Ron Rivest]] et al.)
** [[RC5]] (by [[Ron Rivest]])
** [[RC5]] (by [[Ron Rivest]])
** [[SAFER]] (variable block length)
** [[SAFER]] (variable block length)
Line 228: Line 228:
** [[3-Way]] (96 bit block by [[Joan Daemen]])
** [[3-Way]] (96 bit block by [[Joan Daemen]])
** [[Tiny Encryption Algorithm|TEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])
** [[Tiny Encryption Algorithm|TEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])
** [[Triple DES]] (by [[Walter Tuchman]], leader of the [[Lucifer (cipher)|Lucifer]] design team -- not all triple uses of DES increase security, Tuchman's does; [[CRYPTREC]] recommendation (limited), only when used as in FIPS Pub 46-3)
** [[Triple DES]] (by [[Walter Tuchman]], leader of the [[Lucifer (cipher)|Lucifer]] design team—not all triple uses of DES increase security, Tuchman's does; [[CRYPTREC]] recommendation (limited), only when used as in FIPS Pub 46-3)
** [[Twofish]] (128 bit block; AES finalist by [[Bruce Schneier]], et al)
** [[Twofish]] (128 bit block; AES finalist by [[Bruce Schneier]], et al.)
** [[XTEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])
** [[XTEA]] (by [[David Wheeler (computer scientist)|David Wheeler]] & [[Roger Needham]])


* Polyalphabetic substitution machine cyphers
* Polyalphabetic substitution machine cyphers
** [[Enigma (machine)|Enigma]] (WWII German rotor cypher machine -- many variants, many user networks for most of the variants)
** [[Enigma (machine)|Enigma]] (WWII German rotor cypher machine—many variants, many user networks for most of the variants)
** [[Purple code|Purple]] (highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain)
** [[Purple code|Purple]] (highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain)
** [[SIGABA]] (WWII US cypher machine by [[William Friedman]], [[Frank Rowlett]], et al)
** [[SIGABA]] (WWII US cypher machine by [[William Friedman]], [[Frank Rowlett]], et al.)
** [[TypeX]] (WWII UK cypher machine)
** [[TypeX]] (WWII UK cypher machine)


Line 300: Line 300:
* [[Hardware random number generator]]s
* [[Hardware random number generator]]s
* [[Blum Blum Shub]]
* [[Blum Blum Shub]]
* [[Yarrow algorithm|Yarrow]] (by Schneier, et al)
* [[Yarrow algorithm|Yarrow]] (by Schneier, et al.)
* [[Fortuna (PRNG)|Fortuna]] (by Schneier, et al)
* [[Fortuna (PRNG)|Fortuna]] (by Schneier, et al.)
* [[ISAAC (cipher)|ISAAC]]
* [[ISAAC (cipher)|ISAAC]]
* RPNG based on SHA-1 in ANSI X9.42-2001 Annex C.1 ([[CRYPTREC]] example)
* RPNG based on SHA-1 in ANSI X9.42-2001 Annex C.1 ([[CRYPTREC]] example)
Line 325: Line 325:
* [[Digital Rights Management]] (DRM)
* [[Digital Rights Management]] (DRM)
* Cryptography [[patents]]
* Cryptography [[patents]]
** [[RSA]] (now public domain}
** [[RSA]] (now public domain)
** [[David Chaum]] and digital cash
** [[David Chaum]] and digital cash
* [[Cryptography and law enforcement]]
* [[Cryptography and law enforcement]]

Revision as of 20:27, 21 May 2009

Classical ciphers

Famous ciphertexts

Attacks on classical ciphers

Modern algorithms, methods evaluation and selection projects

Standards organizations

  • the Federal Information Processing Standards Publication program (run by NIST to produce standards in many areas to guide operations of the US Federal government; many FIPS Pubs are cryptography related, ongoing)
  • the ANSI standardization process (produces many standards in many areas; some are cryptography related, ongoing)
  • ISO standardization process (produces many standards in many areas; some are cryptography related, ongoing)
  • IEEE standardization process (produces many standards in many areas; some are cryptography related, ongoing)
  • IETF standardization process (produces many standards (called RFCs) in many areas; some are cryptography related, ongoing)

See Cryptography standards

Cryptographic organizations

  • NSA internal evaluation/selections (NSA is charged with assisting NIST in its cryptographic responsibilities)
  • GCHQ internal evaluation/selections (a division of GCHQ is charged with developing and recommending cryptographic standards for the UK government)
  • DSD Australian SIGINT agency - part of ECHELON
  • Communications Security Establishment (CSE) — Canadian intelligence agency.

Open efforts

  • the DES selection (NBS selection process, ended 1976)
  • the RIPE division of the RACE project (sponsored by the European Union, ended mid-'80s)
  • the AES competition (a 'break-off' sponsored by NIST; ended 2001)
  • the NESSIE Project (evaluation/selection program sponsored by the European Union; ended 2002)
  • the eSTREAM program (ECRYPT-funded; motivated by the failure of all of the stream ciphers submitted to NESSIE; ended 2008)
  • the CRYPTREC program (Japanese government sponsored evaluation/recommendation project; draft recommendations published 2003)
  • the Internet Engineering Task Force (technical body responsible for Internet standards—the Request for Comment series: ongoing)
  • the CrypTool project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)

Cryptographic hash functions (message digest algorithms)

Public key / private key encryption algorithms (aka asymmetric key algorithms)

Public key / private key signature algorithms

Key authentication

Anonymous identification scheme

  • GPS (NESSIE selection anonymous identification scheme; Ecole Normale Supérieure, France Télécom, & La Poste)

Secret key algorithms (aka symmetric key algorithms)

  • Polyalphabetic substitution machine cyphers
    • Enigma (WWII German rotor cypher machine—many variants, many user networks for most of the variants)
    • Purple (highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain)
    • SIGABA (WWII US cypher machine by William Friedman, Frank Rowlett, et al.)
    • TypeX (WWII UK cypher machine)
  • Hybrid code/cypher combinations
    • JN-25 (WWII Japanese Navy superencyphered code; many variants)
    • Naval Cypher 3 (superencrypted code used by the Royal Navy in the 30s and into WWII)

Classified cryptography (U.S.)

  • EKMS NSA's Electronic Key Management System
  • FNBDT NSA's secure narrow band voice standard
  • Fortezza encryption based on portable crypto token in PC Card format
  • KW-26 ROMULUS teletype encryptor (1960s - 1980s)
  • KY-57 VINSON tactical radio voice encryption
  • SINCGARS tactical radio with cryptographically controlled frequency hopping
  • STE secure telephone
  • STU-III older secure telephone
  • TEMPEST prevents compromising emanations
  • Type 1 products

Breaking ciphers

Weak keys and password-based cryptography

Key transport/exchange

Anonymous communication

Terminology

Books and publications

Cryptographers

Uses of cryptographic techniques

Robustness properties

Miscellaneous

Free / open-source cryptosystems (ie, algorithms + protocols + system design)

  • PGP (a name for any of several related crypto systems, some of which, beginning with the acquisition of the name by Network Associates, have not been Free Software in the GNU sense)
  • FileCrypt (an open source/commercial command line version of PGP from Veridis of Denmark, see PGP)
  • GPG (an open source implementation of the OpenPGP IETF standard crypto system)
  • SSH (Secure SHell implementing cryptographically protected variants of several common Unix utilities, First developed as open source in Finland by Tatu Ylönen. There is now OpenSSH, an open source implementation supporting both SSH v1 and SSH v2 protocols. There are also commercial implementations.
  • IPsec (Internet Protocol Security IETF standard, a mandatory component of the IPv6 IETF standard)
  • Free S/WAN (an open source implementation of IPsec)
  • CrypTool project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)