Jump to content

Topics in cryptography

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Ww (talk | contribs) at 00:15, 5 March 2004 (breif explanation of intent, xref to alpha list). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

List of Topics in cryptography.

This article is intended to be an 'analytic glossary', or alternatively, a collection of pointers. See List of cryptology for an alphabetical listing of crypto articles and references in the Wikipedia.

Classical ciphers

Famous ciphertexts

Attacks on classical ciphers

Hash functions, aka message digest functions, cryptographic hash functions

Public key / private key encryption algorithms (aka asymmetric key algorithms)

Public key / private key signature algorithms

Key authentication

Anonymous identification scheme

  • GPS (NESSIE selection anonymous identification scheme; Ecole Normale Supérieure, France Télécom, & La Poste)

Secret key algorithms (aka symmetric key algorithms)

  • Polyalphabetic substitution machine cyphers
    • Enigma (WWII German rotor cypher machine -- many variants, many user networks for most of the variants)
    • Purple (highest security WWII Japanese Foreign Office cypher machine)
    • SIGABA (WWII US cypher machine)
    • TypeX (WWII UK cypher machine)
  • Hybrid code/cypher combinations
    • JN-25 (WWII Japanese Navy superencyphered code; many variants)
    • Naval Cypher 3 (superencrypted code used by the Royal Navy in the 30s and into WWII)

Breaking ciphers

Weak key issues


Key transport/exchange

Anonymous communication

Terminology

Cryptographers

Uses of cryptographic techniques

Misc

Free/Open Source crypto systems (ie, algorithms + protocols + system design)

  • PGP (a name for any of several related crypto systems, some of which, beginning at acquisiton of the name by Network Associates, have not been Free Software in the GNU sense)
  • GPG (an open source implementation of the OpenPGP IETF standard crypto system)
  • SSH (Secure SHell implementing cryptographically protected variants of several common Unix utilities, First developed as open source in Finland by Tatu Ylonen. There is now OpenSSH, an open source implementation supporting both SSH v1 and SSH v2 protocols. There are also commercial implementations.
  • IPSec (Internet Protocol Security IETF standard, a mandatory component of the IPv6 IETF standard)
  • Free S/WAN (an open source implementation of IPSec)