Table of Contents
Outline of Cryptography
Cryptography: History of cryptography ]] | [[Cryptanalysis ]] | [[Outline of cryptography ]] | [[Symmetric-key algorithm ]] | [[Block cipher ]] | [[Stream cipher ]] | [[Public-key cryptography ]] | [[Cryptographic hash function ]] | [[Message authentication code ]] | [[Cryptographically secure pseudorandom number generator | Random numbers ]] | [[Steganography (Cryptography navbar)
Short description: Overview of and topical guide to cryptography
The following Outline (list) | outline is provided as an overview of and topical guide to cryptography:
Cryptography (or cryptology); practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include automated teller machine | ATM cards, password | computer passwords, and electronic commerce.
Essence of cryptography
Uses of cryptographic techniques
Branches of cryptography
History of cryptography
Ciphers
Classical
Substitution
- Monoalphabetic substitution
-
-
-
Transposition
- VIC cipher; complex hand cipher used by at least one Soviet spy in the early 1950s; it proved quite secure for the time
Modern symmetric-key algorithms
Main: Symmetric-key algorithm
Stream ciphers
- FISH (cipher) | FISH; by Siemens AG
-
- Geheimfernschreiber; WWII mechanical onetime pad by Siemens AG, called Sturgeon (cryptography) | STURGEON by Bletchley Park
- Lorenz cipher | Schlusselzusatz; WWII mechanical onetime pad by C. Lorenz AG | Lorenz, called tunny by Bletchley Park
- ISAAC (cipher) | ISAAC; intended as a PRNG
- One-time pad; Vernam and Mauborgne, patented 1919; an extreme stream cipher
- RC4 (cipher) | RC4 (ARCFOUR); one of a series by Professor Ron Rivest of MIT; CRYPTREC recommended limited to 128-bit key
- CipherSaber (RC4 (cipher) | RC4 variant with 10 byte random Initialization vector | IV, easy to implement
-
- ChaCha20; A Salsa20 variant.
-
Block ciphers
Block ciphers: For further reading, see: Block cipher modes of operation
- Feistel cipher; pattern by Horst Feistel
- Advanced Encryption Standard (g>Rijndael); 128-bit block; NIST selection for the AES, FIPS 197; Created 2001—by Joan Daemen and Vincent Rijmen; NESSIE selection; CRYPTREC recommendation.
- Anubis (cipher) | Anubis; 128-bit block
- BEAR (cipher) | BEAR; built from a stream cipher and hash function, by Ross J. Anderson | Ross Anderson
- Camellia (cipher) | Camellia; 128-bit block; NESSIE selection (NTT & Mitsubishi Electric); CRYPTREC recommendation
- CAST-128 (CAST5); 64-bit block; one of a series of algorithms by Carlisle Adams and Stafford Tavares, insistent that the name is not due to their initials
- CIPHERUNICORN-A; 128-bit block; CRYPTREC recommendation
- CIPHERUNICORN-E; 64-bit block; CRYPTREC recommendation (limited)
- CMEA (cipher) | CMEA; cipher used in US cellphones, found to have weaknesses.
- CS-Cipher; 64-bit block
- DEAL; an AES candidate derived from DES
- DES-X; a variant of DES to increase the key size.
- Grand Cru (cipher) | Grand Cru; 128-bit block
- Hierocrypt-3; 128-bit block; CRYPTREC recommendation
- Hierocrypt-L1; 64-bit block; CRYPTREC recommendation (limited)
- IDEA NXT; project name FOX, 64-bit and 128-bit block family; Mediacrypt (Switzerland); by Pascal Junod & Serge Vaudenay of Swiss Institute of Technology Lausanne
- Iraqi Block Cipher (IBC)
- KASUMI (block cipher) | KASUMI; 64-bit block; based on MISTY1, adopted for next generation W-CDMA cellular phone security
- Khufu and Khafre; 64-bit block ciphers
- Kuznyechik; Russian 128-bit block cipher, defined in GOST R 34.12-2015 and RFC 7801.
- LION (cipher) | LION; block cipher built from stream cipher and hash function, by Ross J. Anderson | Ross Anderson
- LOKI97; 128-bit block cipher, AES candidate
- Lucifer (cipher) | Lucifer; by Tuchman et al. of IBM, early 1970s; modified by NSA/National Institute of Standards and Technology | NBS and released as Data Encryption Standard | DES
- MAGENTA; AES candidate
- MISTY2; 128-bit block: Mitsubishi Electric (Japan)
- Nimbus (cipher) | Nimbus; 64-bit block
- NOEKEON; 128-bit block
- NUSH; variable block length (64-256-bit)
- Q (cipher) | Q; 128-bit block
- RC2; 64-bit block, variable key length
- RC6; variable block length; AES finalist, by Ron Rivest et al.
- SAFER; variable block length
- Serpent (cipher) | Serpent; 128-bit block; AES finalist by Ross J. Anderson | Ross Anderson, Eli Biham, Lars Knudsen
- SHACAL-1; 160-bit block
- Shark (cipher) | Shark; grandfather of Rijndael/Advanced Encryption Standard | AES, by Daemen and Rijmen
- Square (cipher) | Square; father of Rijndael/Advanced Encryption Standard | AES, by Daemen and Rijmen
- Triple DES; by Walter Tuchman, leader of the Lucifer (cipher) | Lucifer design team—not all triple uses of DES increase security, Tuchman's does; CRYPTREC recommendation (limited), only when used as in FIPS Pub 46-3
- Twofish; 128-bit block; AES finalist by Bruce Schneier et al.
- 3-Way; 96-bit block by Joan Daemen
- Polyalphabetic substitution machine cyphers
- Enigma (machine) | Enigma; WWII German rotor cypher machine—many variants, any user networks for most of the variants
- Purple code | Purple; highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain
- TypeX; WWII UK cypher machine
- Hybrid code/cypher combinations
- JN-25; WWII Japanese Navy superencyphered code; many variants
- Naval Cypher 3; superencrypted code used by the Royal Navy in the 1930s and into WWII
Modern asymmetric-key algorithms
[[wp>Asymmetric key algorithm]]
-
- Diffie-Hellman; key agreement; CRYPTREC recommendation
- El Gamal; discrete logarithm
- Elliptic curve cryptography; (discrete logarithm variant)
- PSEC-KEM; NESSIE selection asymmetric encryption scheme; NTT (Japan); CRYPTREC recommendation only in DEM construction w/SEC1 parameters
- ECIES; Elliptic Curve Integrated Encryption System, Certicom Corporation
- Merkle–Hellman knapsack cryptosystem; knapsack scheme
- RSA (algorithm) | RSA; factoring
- Rabin cryptosystem; factoring
Keys
[[Key authentication]]
Transport/exchange
[[Weak key]]s
- Factorization<ref>
</ref>
[[Cryptographic hash function]]s
-
- TTMAC – (Two-Track-MAC) NESSIE selection MAC; K.U.Leuven (Belgium) & debis AG (Germany)
- MD5 – one of a series of message digest algorithms by Prof Ron Rivest of MIT; 128-bit digest
- SHA-1 – developed at NSA 160-bit digest, an FIPS standard; the first released version was defective and replaced by this; NIST/NSA have released several variants with longer 'digest' lengths; CRYPTREC recommendation (limited)
- SHA-3 – originally known as Keccak; was the winner of the NIST hash function competition using sponge function.
- RIPEMD-160 – developed in Europe for the RIPE project, 160-bit digest; CRYPTREC recommendation (limited)
- RTR0 – one of Retter series; developed by Maciej A. Czyzewski; 160-bit digest
- Snefru (cryptography) | Snefru – NIST hash function competition
- Whirlpool (algorithm) | Whirlpool – NESSIE selection hash function, Scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium)
[[Cryptanalysis]]
Classical
Modern
- Symmetric algorithms
- Hash functions:
-
-
- Network attacks
- External attacks
Robustness properties
Undeciphered historical codes and ciphers
Organizations and selection projects
Cryptography standards
- Federal Information Processing Standards (FIPS) Publication Program – run by NIST to produce standards in many areas to guide operations of the US Federal government; many FIPS publications are ongoing and related to cryptography
- American National Standards Institute (ANSI) – standardization process that produces many standards in many areas; some are cryptography related, ongoing) <!–***we need a list here! – help, please *** –>
- International Organization for Standardization (ISO) – standardization process produces many standards in many areas; some are cryptography related, ongoing <!– ***we need a list here! – help, please ***) –>
- Institute of Electrical and Electronics Engineers (IEEE) – standardization process produces many standards in many areas; some are cryptography related, ongoing <!– ***we need a list here! – help, please ***) –>
- Internet Engineering Task Force (IETF) – standardization process that produces many standards called Request for Comments | RFCs) in many areas; some are cryptography related, ongoing)<!–***we need a list here! – help, please *** –>
General cryptographic
- National Security Agency (NSA) – internal evaluation/selections, charged with assisting NIST in its cryptographic responsibilities
- Government Communications Headquarters (GCHQ) – internal evaluation/selections, a division is charged with developing and recommending cryptographic standards for the UK government <!– **** we need more information here – help! **** –>
- Communications Security Establishment (CSE) – Canadian intelligence agency
<!–
- and the same for China, France, Germany, India, Russia, etc–>
Open efforts
- RIPE – division of the RACE project sponsored by the European Union, ended mid-1980s
- Advanced Encryption Standard (AES) – a “break-off” competition sponsored by NIST, ended in 2001
- NESSIE Project – an evaluation/selection program sponsored by the European Union, ended in 2002
- eSTREAM– program funded by ECRYPT; motivated by the failure of all of the stream ciphers submitted to NESSIE, ended in 2008
- CRYPTREC – evaluation/recommendation program sponsored by the Japanese government; draft recommendations published 2003
- CrypTool – an e-learning freeware programme in English and German— exhaustive educational tool about cryptography and cryptanalysis
<!–
- need a list here, Help, please **** –>
Influential cryptographers
Legal issues
-
- Bernstein v. United States - Daniel J. Bernstein's challenge to the restrictions on the export of cryptography from the United States.
- Arms Export Control Act investigation | Phil Zimmermann - Arms Export Control Act investigation regarding the Pretty Good Privacy | PGP software.
-
- RSA (algorithm) | RSA – now public domain
- David Chaum – and digital cash
-
-
- Official Secrets Act – United Kingdom, India, Ireland, Malaysia, and formerly New Zealand
- Regulation of Investigatory Powers Act 2000 – United Kingdom
Academic and professional publications
- Cryptologia – quarterly journal focusing on historical aspects
- Communication Theory of Secrecy Systems – cryptography from the viewpoint of information theory
Allied sciences
See also
- Snippet from Wikipedia: Outline of cryptography
The following outline is provided as an overview of and topical guide to cryptography:
Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.