Outline of cryptography

Source: Wikipedia, the free encyclopedia.

The following outline is provided as an overview of and topical guide to cryptography:

electronic commerce
.

Essence of cryptography

Uses of cryptographic techniques

Branches of cryptography

History of cryptography

Ciphers

Classical

Substitution

Transposition

  • Scytale
  • Grille
  • Permutation cipher
  • VIC cipher – complex hand cypher used by at least one Soviet spy in the early 1950s; it proved quite secure for the time

Modern symmetric-key algorithms

Stream ciphers

Block ciphers

Modern asymmetric-key algorithms

Asymmetric key algorithm

Keys

Key authentication

Transport/exchange

  • Diffie–Hellman
  • Man-in-the-middle attack
  • Needham–Schroeder
  • Offline private key
  • Otway–Rees
  • Trusted paper key
  • Wide Mouth Frog

Weak keys

Cryptographic hash functions

Cryptanalysis

Classical

Modern

Robustness properties

Undeciphered historical codes and ciphers

Organizations and selection projects

Cryptography standards

General cryptographic

  • National Security Agency (NSA) – internal evaluation/selections, charged with assisting NIST in its cryptographic responsibilities
  • Government Communications Headquarters
    (GCHQ) – internal evaluation/selections, a division is charged with developing and recommending cryptographic standards for the UK government
  • SIGINT agency, part of ECHELON
  • Communications Security Establishment (CSE) – Canadian intelligence agency

Open efforts

  • NBS
    selection process, ended 1976
  • RIPE – division of the RACE project sponsored by the European Union, ended mid-1980s
  • NIST
    , ended in 2001
  • NESSIE Project – an evaluation/selection program sponsored by the European Union, ended in 2002
  • eSTREAM– program funded by ECRYPT; motivated by the failure of all of the stream ciphers submitted to NESSIE, ended in 2008
  • CRYPTREC – evaluation/recommendation program sponsored by the Japanese government; draft recommendations published 2003
  • CrypTool – an e-learning freeware programme in English and German— exhaustive educational tool about cryptography and cryptanalysis

Influential cryptographers

List of cryptographers

Legal issues

Academic and professional publications

Allied sciences

See also

References

  1. ^ "Research Paper - factorable.net". factorable.net. Retrieved 2020-06-26.