Index of cryptography articles
This page aims to alphabetically list terms that are related to cryptography. There is an organized (somewhat annotated) list of many/most of the same articles in subject groupings at Topics in cryptography; it will probably be more useful to those attempting to make some sense of the field. This article is intended to be useful to those interested in the Wikipedia's coverage of the subject (eg, for editing or maintenance purposes) by providing an easy way to monitor changes in the indexed articles by clicking on "Related changes" in the sidebar or the link below:
This list does not necessarily include all cryptographically related articles in the Wikipedia, though there is a concerted effort to keep it so. Nevertheless, if you see an article that should be here, but isn't (or one that shouldn't be here but is), please do update this article accordingly.
See also
- Topics in cryptography — an analytical list of articles and terms.
- Books on cryptography — an annotated list of suggested readings.
- List of cryptographers — an annotated list of cryptographers.
- Important publications in cryptography — some cryptography papers in computer science.
Digits and symbols
3-Way -- 40-bit encryption --
A
A5/1 -- A5/2 -- Abraham Sinkov -- Adaptive chosen ciphertext attack -- ADFGVX cipher -- Adi Shamir -- Advanced Encryption Standard (AES) -- Advanced Encryption Standard process -- Affine cipher -- Agnes Meyer Driscoll -- Alan Turing -- Anonymous remailer -- Arne Beurling -- Asymmetric key algorithm -- Atbash cipher -- Attacker -- Auguste Kerckhoffs -- Authentication -- Autokey cipher --
B
Babington plot -- Beale Ciphers -- Birthday attack -- Bit-flipping attack -- Blaise de Vigenère -- Bletchley Park -- Blinding -- Blind signature -- Block cipher -- Block cipher modes of operation -- Block size -- Blowfish -- Blum Blum Shub -- Book cipher -- Books on cryptography -- Bruce Schneier -- Brute force attack -- Burrows-Abadi-Needham logic --
C
Caesar cipher -- CAcert -- CAST-128 -- Camellia -- Certificate authority -- Certificate-based encryption -- Certificateless Cryptography -- Certificate Revocation List -- Chaffing and winnowing -- Chosen ciphertext attack -- Chosen plaintext attack -- Cipher -- Cipher Block Chaining -- Cipherspace -- Ciphertext-only attack -- Claude Shannon -- Clipper chip -- Code -- Codebook -- Colossus computer -- Commitment scheme -- Computer insecurity -- Computer surveillance -- Communications security (COMSEC) -- COMSEC equipment -- Confidentiality -- Confusion and diffusion -- Content-scrambling system -- Cover -- Covert channel -- Cryptanalysis -- CRYPTO -- Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age -- Crypto system -- Crypto-anarchism -- Cryptogram -- Cryptographic engineering -- Cryptographic hash function -- Cryptographic Message Syntax -- Cryptographically secure pseudo-random number generator -- Cryptographically strong -- Cryptographie indéchiffrable -- Cryptography -- Cryptologia -- Cryptomathic -- Cryptome -- Cryptonomicon -- Crypto-society -- CRYPTREC -- Cypherpunk -- Cyphertext --
D
Daniel J. Bernstein -- Data Encryption Standard -- David Chaum -- David Wagner -- David Wheeler -- Decipherment -- Decrypt -- DeCSS -- Dictionary attack -- Differential cryptanalysis -- Diffie-Hellman key exchange -- DigiCipher 2 -- Digital signature -- Digital Signature Algorithm -- Digital timestamping -- Dining cryptographers protocol -- Discrete logarithm -- Distributed.net -- Don Coppersmith -- Dorabella Cipher --
E
ECHELON -- Electronic money -- Electronic voting -- ElGamal discrete log cryptosystem -- Eli Biham -- Elizebeth Friedman -- Elliptic curve cryptography -- Elliptic Curve DSA -- Encode -- Encryption -- Enigma machine -- Espionage -- Étienne Bazeries -- Exclusive disjunction --
F
Famous ciphertexts -- Feistel cipher -- Financial cryptography -- FISH -- Frank A. Stevenson -- Frank Rowlett -- Frequency analysis -- Friedrich Kasiski -- Fritz-chip --
G
Garble -- Geheimfernschreiber -- Glossary of telecommunications encryption terms -- GNU Privacy Guard -- GOST -- Government Communications Headquarters --
H
Hardware random number generator -- Hebern Rotor Machine -- Henryk Zygalski -- Herbert Yardley -- History of cryptography -- Horst Feistel --
I
ID-based cryptography -- Index of coincidence -- Information security -- Information theory -- Initialization vector -- International Association for Cryptologic Research -- International Data Encryption Algorithm (IDEA) -- Internet key exchange -- Invisible ink -- IPSec -- Iraqi Block Cipher -- Iraqi block cipher -- ISAAC --
J
Jerzy Rozycki -- JN-25 -- Joseph Rochefort -- Journal of Cryptology --
K
Kerberos -- Kerckhoffs' law -- Key-agreement protocol -- Key authentication -- Key -- Key derivation function -- Key distribution center -- Key escrow -- Key signature -- Key signing party -- Key size -- Keyed-hash message authentication code -- Knapsack problem -- Known-plaintext attack -- KY-57 --
L
Laurence Safford -- Leo Marks -- Leonard Adleman -- Leone Battista Alberti -- Linear cryptanalysis -- Linear feedback shift register -- List of cryptographers -- Lorenz cypher -- Lucifer --
M
Man in the middle attack -- Marian Rejewski -- MARS -- Martin Hellman -- Max Newman -- MD5 -- MD5CRK -- Meet-in-the-middle attack -- Merkle-Hellman -- Message authentication code -- Message digest -- Microdot --
N
National Security Agency -- Needham-Schroeder -- NESSIE -- Niels Ferguson -- NTRUEncrypt -- Null cipher --
O
One-time pad -- One way function -- OpenPGP -- OpenSSH -- OpenSSL -- Otway-Rees --
P
Paillier cryptosystem -- Passive attack -- Pass phrase -- Password -- Password cracking -- Permutation cipher -- Phil Zimmermann -- Physical security -- Pike (cipher) -- Plaintext -- Playfair cipher -- Poem code -- Polyalphabetic cipher -- Polybius square -- Pretty Good Privacy -- Pseudonymity -- Pseudorandom number generator -- Public key certificate -- Public-key cryptography -- Public key infrastructure -- Purple code --
Q
R
Rabin cryptosystem -- Ralph Merkle -- Random oracle -- RC4 -- RC5 -- RC6 -- Rijndael -- RIPEMD-160 -- Ron Rivest -- Ross Anderson -- ROT13 -- ROT-47 -- Rotor machine -- RSA -- RSA Security -- Rubber-hose cryptanalysis -- Running key cipher --
S
S-1 -- Schnorr signature -- Scrambler -- Scytale -- SEAL -- Secret sharing -- Secure cryptoprocessor -- Secure Key Issuing Cryptography -- Secure shell -- Security engineering -- Security protocol notation -- Security through obscurity -- Self-certifying key -- Serpent -- Session key -- SHA-1 -- Shrinking generator -- SIGABA -- SIGINT -- Skipjack -- Snake oil -- Snefru -- Solomon Kullback -- Steganography -- Straddling checkerboard -- Stream cipher -- Substitution box -- Substitution cipher -- Substitution-permutation network -- Symmetric encryption -- Symmetric key algorithm -- SYSKEY --
T
Tabula recta -- Tamper resistance -- TEMPEST -- The Codebreakers -- Tiger -- Timing attack -- Tiny Encryption Algorithm -- Topics in cryptography -- Traffic analysis -- Transport Layer Security -- Transposition cipher -- Trapdoor function -- Triple DES -- Trusted third party -- Tunny -- Twofish -- Type 1 product -- Type 2 product -- Typex --
U
Ultra -- Undeniable signature -- Unicity distance --
V
VENONA project -- VIC cipher -- Vigenère -- Vincent Rijmen -- Visual cryptography -- Voynich Manuscript --
W
Whitfield Diffie -- Wide Mouth Frog -- Wi-Fi Protected Access -- William F. Friedman -- Wired Equivalent Privacy -- W. T. Tutte --
X
Y
Z
Zero-knowledge proof -- Zeroise --