Encyclopedia  |   World Factbook  |   World Flags  |   Reference Tables  |   List of Lists     
   Academic Disciplines  |   Historical Timeline  |   Themed Timelines  |   Biographies  |   How-Tos     
Sponsor by The Tattoo Collection
List of cryptography topics
Main Page | See live article | Alphabetical index

List of cryptography topics

This page aims to alphabetically list articles that are primarily related to cryptography. There is a categorised and (somewhat) annotated list of the same articles in subject groupings at Topics in cryptography; it will probably be more useful to those attempting to make some sense of the field. This page is intended to be useful to those monitoring Wikipedia's coverage of the subject (e.g. for editing or maintenance purposes) by providing an easy way to track changes in the indexed articles by clicking on "Related changes" in the sidebar or the link below:

This list does not necessarily include all cryptography-related articles in the Wikipedia, though there is a concerted effort to keep it so. Nevertheless, if you see an article that should be here, but isn't (or one that shouldn't be here but is), please do update the list accordingly.

Note: this page is also being made somewhat redundant by the new category system. See and its subcategories.

See also

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Digits and symbols

3-Way -- 40-bit encryption -- 802.11i --

A

A5/1 -- A5/2 -- Abraham Sinkov -- Adaptive chosen ciphertext attack -- ADFGVX cipher -- Adi Shamir -- Advanced Encryption Standard -- Advanced Encryption Standard process -- Adversary -- Affine cipher -- Agnes Meyer Driscoll -- Alan Turing -- Alice and Bob -- Anonymous publication -- Anonymous remailer -- Arlington Hall -- Arne Beurling -- Arthur Scherbius -- Asymmetric key algorithm -- Atbash cipher -- Attacker -- Auguste Kerckhoffs -- Authentication -- Autokey cipher -- Avalanche effect -- AxCrypt --

B

Babington plot -- Baby-step giant-step -- Bazeries cylinder -- Beale ciphers -- Bernstein v. United States -- Bifid cipher -- Birthday attack -- Bit-flipping attack -- Biuro Szyfrow -- Blaise de Vigenère -- Bletchley Park -- Blind credential -- Blinding (cryptography) -- Blind signature -- Block cipher -- Block cipher modes of operation -- Block size (cryptography) -- Blowfish (cipher) -- Blum Blum Shub -- Bombe -- Book cipher -- Books on cryptography -- Boris Hagelin -- Bruce Schneier -- Brute force attack -- Burrows-Abadi-Needham logic --

C

Caesar cipher -- CAcert -- CAST-128 -- CAST-256 -- Camellia (cipher) -- Central Security Service -- Cellular Message Encryption Algorithm -- Certificate authority -- Certificate-based encryption -- Certificateless Cryptography -- Certificate Revocation List -- Certicom -- Chaffing and winnowing -- Challenge-response test -- Chosen ciphertext attack -- Chosen plaintext attack -- Cipher Block Chaining -- CipherSaber -- Cipherspace -- Ciphertext-only attack -- Claude E. Shannon -- Cleartext -- Classical cipher -- Clifford Cocks -- Clipper chip -- Code (cryptography) -- Codebook -- Code talkers -- Colossus computer -- Commitment scheme -- Common Scrambling Algorithm -- Communications security -- Communications Security Establishment -- Communication Theory of Secrecy Systems -- Computer insecurity -- Computer surveillance -- COMSEC equipment -- Confidentiality -- Confusion and diffusion -- Content-scrambling system -- Cover (telecommunications) -- Covert channel -- Crib -- CrossCrypt -- Cryptanalysis -- CRYPTO -- Crypto AG --

 --
Crypto system -- Crypto-anarchism -- CryptoBuddy -- Cryptochannel -- Cryptogram -- Cryptographic engineering -- Cryptographic hash function -- Cryptographic Message Syntax -- Cryptographic protocol -- Cryptographically secure pseudo-random number generator -- Cryptographically strong -- Cryptographie indéchiffrable -- Cryptography -- Cryptography newsgroups -- Cryptography standards -- Cryptologia -- Cryptology ePrint Archive -- Cryptomathic -- Cryptome -- Cryptonomicon -- CryptoStick -- Crypto-society -- CRYPTREC -- Cypherpunk --

D

Daniel J. Bernstein -- Data Encryption Standard -- David Chaum -- David Kahn -- David Wagner -- David Wheeler -- DEAL -- Decipherment -- Decrypt -- DeCSS -- Defence Signals Directorate -- DES-X -- Dictionary attack -- Differential cryptanalysis -- Diffie-Hellman key exchange -- DigiCipher 2 -- Digital rights management -- Digital signature -- Digital Signature Algorithm -- Digital timestamping -- Dining cryptographers protocol -- Diplomatic bag -- Direct anonymous attestation -- Discrete logarithm -- Distributed.net -- Dmitry Sklyarov -- Don Coppersmith -- Dorabella Cipher -- DRYAD --

E

ECHELON -- Edward Hebern -- EFF DES cracker -- Electronic money -- Electronic signature -- Electronic voting -- ElGamal discrete log cryptosystem -- Eli Biham -- Elizebeth Friedman -- Elliptic curve cryptography -- Elliptic Curve DSA -- Encryption -- Enigma machine -- Enigmail -- Étienne Bazeries -- Export of cryptography --

F

FEAL -- Feistel cipher -- Financial cryptography -- FISH (cryptography) -- Fortezza -- Frank A. Stevenson -- Frank Rowlett -- FreeLIP -- Frequency analysis -- Friedrich Kasiski -- Fritz-chip --

G

Garble -- Gardening (cryptanalysis) -- GDES -- Geheimfernschreiber -- Gilbert Vernam -- Glossary of telecommunications encryption terms -- GMR -- GNU Privacy Guard -- GOST -- Government Communications Headquarters -- Great Cypher --

H

Hans Thilo-Schmidt -- Hardware random number generator -- Hashcash -- Hebern Rotor Machine -- Henryk Zygalski -- Herbert Yardley -- History of cryptography -- Horst Feistel -- HTTPS -- Hushmail -- Hyperelliptic curve cryptography --

I

ID-based cryptography -- I. J. Good -- Illegal prime -- Index of coincidence -- Information security -- Information-theoretically secure -- Initialization vector -- Integer factorization -- International Association for Cryptologic Research -- International Data Encryption Algorithm -- Internet key exchange -- Internet Security Association and Key Management Protocol -- Invisible ink -- IPSec -- Iraqi block cipher -- ISAAC (cipher) --

J

James Ellis -- Jerzy Rozycki -- JN-25 -- Joan Daemen -- Johannes Trithemius -- John Tiltman -- Joseph Rochefort -- Joseph Mauborgne -- Journal of Cryptology --

K

Kasiski examination -- KASUMI -- Kerberos (protocol) -- Kerckhoffs' law -- Key-agreement protocol -- Key authentication -- Key (cryptography) -- Key derivation function -- Key distribution center -- Key escrow -- Key exchange -- Key management -- Key schedule -- Key server -- Key signature -- Key signing party -- Key size -- Keyed-hash message authentication code -- KHAZAD -- Khufu and Khafre -- Knapsack problem -- Known-plaintext attack -- Kryptos -- KY-57 --

L

Lars Knudsen -- Laurence Safford -- Le chiffre indéchiffrable -- Leo Marks -- Leonard Adleman -- Leone Battista Alberti -- LibTom Project -- Linear cryptanalysis -- Linear feedback shift register -- List of cryptographers -- List of cryptography topics -- List of famous ciphertexts -- LOKI -- LOKI97 -- Lorenz cypher -- Louis W. Tordella -- Lucifer (cipher) --

M

M-94 -- M-209 -- MacGuffin (cipher) -- Madryga -- MAGENTA -- Magic (cryptography) -- Man in the middle attack -- Marian Rejewski -- MARS -- Martin Hellman -- Max Newman -- McEliece -- MD4 -- MD5 -- MD5CRK -- Meet-in-the-middle attack -- Merkle-Hellman -- Merkle's Puzzles -- Message Authentication Code -- Message digest -- Microdot -- MISTY1 -- Mitsuru Matsui -- MMB -- Mod n cryptanalysis --

N

National Security Agency -- National Cryptologic Museum -- Needham-Schroeder -- NESSIE -- NewDES -- Niels Ferguson -- NTRUEncrypt -- Null cipher -- Numbers station --

O

Oblivious transfer -- OMAC -- One-time pad -- One way function -- OpenPGP -- OpenSSH -- OpenSSL -- Otway-Rees --

P

Padding (cryptography) -- Paillier cryptosystem -- Passive attack -- Pass phrase -- Password -- Password cracking -- Paul Kocher -- PC Bruno -- Permutation cipher -- Peter Gutmann -- Phil Zimmermann -- Physical security -- Pike (cipher) -- Piling-up lemma -- PKCS -- Plaintext -- Playfair cipher -- PMAC -- Poem code -- Polyalphabetic cipher -- Polybius square -- Power analysis -- Pretty Good Privacy -- Privacy-enhanced Electronic Mail -- Product cipher -- Pseudonymity -- Pseudorandom number generator -- Public key certificate -- Public-key cryptography -- Public key infrastructure -- Purple code --

Q

Quadratic sieve -- Quantum computing -- Quantum cryptography --

R

Rabin cryptosystem -- Ralph Merkle -- Random oracle -- RC2 -- RC4 (cipher) -- RC5 -- RC6 -- Red Pike -- Regulation of Investigatory Powers Act 2000 -- RIPEMD-160 -- Robert Tappan Morris, Sr -- Ron Rivest -- Room 40 -- Root certificate -- Ross Anderson -- ROT13 -- Rotor machine -- RSA -- RSA-100 -- RSA-110 -- RSA-120 -- RSA-129 -- RSA-130 -- RSA-140 -- RSA-150 -- RSA-155 -- RSA-160 -- RSA-170 -- RSA-180 -- RSA-190 -- RSA-200 -- RSA-210 -- RSA-220 -- RSA-230 -- RSA-232 -- RSA-240 -- RSA-250 -- RSA-260 -- RSA-270 -- RSA-280 -- RSA-290 -- RSA-300 -- RSA-309 -- RSA-310 -- RSA-320 -- RSA-330 -- RSA-340 -- RSA-350 -- RSA-360 -- RSA-370 -- RSA-380 -- RSA-390 -- RSA-400 -- RSA-410 -- RSA-420 -- RSA-430 -- RSA-440 -- RSA-450 -- RSA-460 -- RSA-470 -- RSA-480 -- RSA-490 -- RSA-500 -- RSA-576 -- RSA-617 -- RSA-640 -- RSA-704 -- RSA-768 -- RSA-896 -- RSA-1024 -- RSA-1536 -- RSA-2048 -- RSA Factoring Challenge -- RSA number -- RSA Security -- Rubber-hose cryptanalysis -- Running key cipher -- Russian copulation --

S

S-1 -- SAFER -- Salt (cryptography) -- Schnorr signature -- Scott Vanstone -- Scrambler -- Scytale -- SEAL (cipher) -- Secret sharing -- Secret decoder ring -- Secrets and Lies -- Secure channel -- Secure Communication based on Quantum Cryptography -- Secure cryptoprocessor -- Secure Key Issuing Cryptography -- Secure multiparty computation -- Secure shell -- Secure Terminal Equipment -- Security engineering -- Security protocol notation -- Security through obscurity -- Self-certifying key -- Self signed certificate -- Serpent (cipher) -- Session key -- SHA-1 -- SHARK -- Shrinking generator -- Side channel attack -- SIGABA -- SIGINT -- SIGSALY -- Skipjack (cipher) -- S/KEY -- S/MIME -- Snake oil (cryptography) -- Snefru -- Snuffle -- Solomon Kullback -- SPKI -- Square (cipher) -- Ståle Schumacher Ytteborg -- Steganalysis -- Steganography -- Straddling checkerboard -- Stream cipher -- STU-III -- Stunnel -- Strict Avalanche Criterion -- Substitution box -- Substitution cipher -- Substitution-permutation network -- Symmetric key algorithm -- SYSKEY --

T

Tabula recta -- Taher ElGamal -- Tamper resistance -- TEMPEST --

 --
 --
The Alphabet Cipher -- The Codebreakers -- The Gold Bug -- The Magic Words are Squeamish Ossifrage -- TICOM -- Tiger (hash) -- Timing attack -- Tiny Encryption Algorithm -- Topics in cryptography -- Torus based cryptography -- Traffic analysis -- Transport Layer Security -- Transposition cipher -- Trapdoor function -- Trench code -- Triple DES -- Trusted Third Party -- TWINKLE -- TWIRL -- Twofish -- Type 1 product -- Type 2 product -- Typex --

U

Ultra -- Undeniable signature -- Unicity distance --

V

VENONA project -- VIC cipher -- Vigenère -- Vincent Rijmen -- Visual cryptography -- Voynich Manuscript --

W

WAKE -- Weak key -- Web of trust -- Whitfield Diffie -- WHIRLPOOL -- Wide Mouth Frog -- Wi-Fi Protected Access -- Wikipedia:WikiProject Cryptography -- William F. Friedman -- Wired Equivalent Privacy -- W. T. Tutte --

X

X.509 -- XSL attack -- XTEA --

Y

Yarrow algorithm --

Z

Zero-knowledge proof -- Zeroise -- Zimmermann Telegram -- Zimmerman-Sassaman key-signing protocol --