Topics in cryptography
Appearance
List of Topics in cryptography.
Hash functions, aka message digest functions, cryptographic hash functions
- MD5 (one of a series of message digest algorithms by Prof Ron Rivest of MIT; 128 bit digest)
- SHA-1 (developed at NSA 160-bit digest; the first released version was defective and replaced by this one; NSA has released several variants with longer 'digest' lengths)
- RIPEMD-160 (developed in Europe for the RIPE project; 160-bit digest)
- Tiger (by Ross Anderson et al)
Free/Open Source crypto systems (ie, algorithms + protocols + system design)
- PGP (a name shared by several programs, some of which, especially recently, have not been Free Software in the GNU sense)
- GPG
- SSH
- IPSec / Free S/WAN
Public key / private key encryption algorithms (aka asymmetric key algorithms)
- Diffie-Hellman
- El Gamal
- Elliptic curve cryptography
- RSA
- Digital Signature Algorithm
- Elliptic Curve DSA
- XTR
Secret key algorithms (aka symmetric key algorithms)
- Enigma (WWII German rotor cypher machine -- many variants, many user networks for most variants)
- Purple (highest security WWII Japanese Foreign Office cypher machine)
- SIGABA (WWII US cypher machine)
- JN-25 (WWII Japanese Navy superencyphered code; many variants over time)
- One-time pad (Vernam and Mauborgne, patented mid-'20s)
- Data Encryption Standard (DES, FIPS 46-3, 1976)
- Lucifer cipher (by Tuchman et al of IBM, early 1970s; modified by NSA/NBS and released as DES)
- RC4 cipher (one of a series by Prof Ron Rivest of MIT)
- Blowfish (by Bruce Schneier, et al)
- International Data Encryption Algorithm (IDEA -- J Massey and X Lai of ETH Zurich)
- CAST5 (one of a series of algorithms by Carlisle Adams and Stafford Tavares; they are adamant however that the name is not due to their initials)
- Advanced Encryption Standard (AES, FIPS 197, 2001 -- by Joan Daemen and Vincent Rijmen)
- Twofish (AES finalist, by Bruce Schneier et al)
- RC6 (AES finalist, by Ron Rivest et al)
- MARS (AES finalist, by Don Coppersmith et al)
- Serpent cipher (AES finalist, by Ross Anderson et al)
- Iraqi Block Cipher (IBC)
- Blum Blum Shub
- Yarrow (by Schneier, et al)
- Fortuna (by Schneieir, et al)
- ISAAC
Anonymous communication
- Dining cryptographers protocol (by David Chaum)
- Anonymous remailer
- pseudonymity
- anonymous internet banking
- Onion Routing