Rank
|
Article
|
Hits
|
Size (bytes)
|
Redirects
|
1 |
Sftp |
27 |
18 |
|
2 |
Quantum computing |
226 |
30 |
|
3 |
Voynich Manuscript |
344 |
33 |
|
4 |
Secure File Transfer Protocol |
0 |
44 |
|
5 |
FreeLIP |
10 |
134 |
|
6 |
Josef Pieprzyk |
25 |
161 |
|
7 |
OTFE |
3 |
175 |
|
8 |
Secrets and Lies |
11 |
198 |
|
9 |
Superencryption |
10 |
202 |
|
10 |
Codress message |
5 |
206 |
|
11 |
Scott Vanstone |
3 |
213 |
|
12 |
Message forgery |
9 |
240 |
|
13 |
Frank A. Stevenson |
5 |
268 |
|
14 |
Attacker |
9 |
285 |
|
15 |
Direct anonymous attestation |
9 |
285 |
|
16 |
CCMP |
19 |
286 |
|
17 |
AxCrypt |
15 |
299 |
|
18 |
Certification path validation algorithm |
10 |
306 |
|
19 |
Privacy-enhanced Electronic Mail |
14 |
308 |
Privacy-enhanced electronic mail, Privacy Enhanced Mail
|
20 |
Journal of Cryptology |
6 |
320 |
Journal of cryptology
|
21 |
David Chaum |
23 |
339 |
|
22 |
FIREFLY |
4 |
340 |
|
23 |
COMSEC equipment |
10 |
340 |
|
24 |
Cryptanalytic computer |
6 |
341 |
|
25 |
Financial cryptography |
26 |
347 |
|
26 |
Collision attack |
88 |
348 |
|
27 |
Joseph Mauborgne |
11 |
352 |
|
28 |
Solomon Kullback |
7 |
366 |
|
29 |
Cryptomathic |
5 |
367 |
|
30 |
Yuliang Zheng |
11 |
373 |
|
31 |
Preimage attack |
73 |
386 |
|
32 |
CAcert |
20 |
392 |
|
33 |
HAS-160 |
6 |
395 |
|
34 |
SEED |
84 |
419 |
SEED (cipher)
|
35 |
Cryptology ePrint Archive |
7 |
425 |
EPrint
|
36 |
SEAL (cipher) |
25 |
436 |
SEAL (cryptography)
|
37 |
Cryptologia |
22 |
451 |
|
38 |
Simple public key infrastructure |
13 |
462 |
Simple Public Key Infrastructure, SPKI
|
39 |
RSA-170 |
12 |
476 |
|
40 |
Zimmermann-Sassaman key-signing protocol |
0 |
479 |
Zimmmermann-Sassaman key signing protocol, Zimmerman-Sassaman protocol, Zimmerman-Sassaman key-signing protocol
|
41 |
RSA-180 |
6 |
486 |
|
42 |
Internet Security Association and Key Management Protocol |
17 |
486 |
ISAKMP
|
43 |
Dorabella Cipher |
56 |
490 |
|
44 |
Cardan grille |
38 |
494 |
|
45 |
Online Certificate Status Protocol |
15 |
495 |
Ocsp, OCSP
|
46 |
RSA-190 |
7 |
496 |
|
47 |
Type 3 encryption |
6 |
500 |
Type 3 algorithm
|
48 |
CryptoStick |
6 |
505 |
|
49 |
RSA-200 |
9 |
506 |
|
50 |
RSA-100 |
25 |
506 |
|
51 |
International Association for Cryptologic Research |
3 |
512 |
IACR
|
52 |
Joan Daemen |
13 |
512 |
|
53 |
S/KEY |
7 |
514 |
S/Key
|
54 |
CryptoBuddy |
5 |
516 |
|
55 |
RSA-210 |
8 |
516 |
|
56 |
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age |
17 |
525 |
|
57 |
RSA-220 |
6 |
526 |
|
58 |
RSA-110 |
12 |
527 |
|
59 |
Cover (telecommunications) |
4 |
545 |
|
60 |
RSA-120 |
14 |
545 |
|
61 |
National Cryptologic Museum |
108 |
545 |
National cryptologic museum
|
62 |
RSA-230 |
9 |
548 |
|
63 |
List of famous ciphertexts |
63 |
548 |
Famous ciphertexts
|
64 |
RSA-232 |
7 |
550 |
|
65 |
RSA-250 |
10 |
556 |
|
66 |
RSA-240 |
7 |
558 |
|
67 |
Stunnel |
15 |
564 |
|
68 |
Robert Tappan Morris, Sr. |
0 |
568 |
|
69 |
RSA-260 |
7 |
578 |
|
70 |
Null cipher |
53 |
579 |
Null cypher
|
71 |
Iraqi block cipher |
34 |
580 |
Iraqi Block Cipher
|
72 |
RSA-270 |
8 |
588 |
|
73 |
Key schedule |
40 |
594 |
Key scheduling, Subkey
|
74 |
RSA-280 |
7 |
598 |
|
75 |
A5/2 |
33 |
601 |
|
76 |
RSA-290 |
5 |
608 |
|
77 |
WHIRLPOOL |
5 |
610 |
Whirlpool (hash), Whirlpool (algorithm)
|
78 |
RSA-300 |
8 |
618 |
|
79 |
VINSON |
7 |
626 |
|
80 |
Type 4 encryption |
12 |
627 |
Type 4 algorithm
|
81 |
Henryk Zygalski |
22 |
627 |
|
82 |
Malleability |
24 |
633 |
Malleable, Maellability
|
83 |
Pike (cipher) |
18 |
637 |
Pike (cryptography)
|
84 |
OMAC |
25 |
637 |
|
85 |
RSA-309 |
6 |
639 |
|
86 |
RSA-310 |
10 |
640 |
|
87 |
H.235 |
4 |
648 |
|
88 |
RSA-320 |
6 |
650 |
|
89 |
WAKE |
17 |
650 |
|
90 |
Niels Ferguson |
12 |
659 |
|
91 |
RSA-330 |
9 |
660 |
|
92 |
Communication Theory of Secrecy Systems |
27 |
662 |
|
93 |
[[Cryptographie ind%E9chiffrable]] |
0 |
663 |
|
94 |
Simple XOR Cipher |
4 |
666 |
|
95 |
Passive attack |
8 |
667 |
|
96 |
KOV-14 |
8 |
668 |
Fortezza Plus
|
97 |
RSA-340 |
6 |
670 |
|
98 |
Torus based cryptography |
7 |
677 |
|
99 |
RSA-350 |
8 |
680 |
|
100 |
Strict avalanche criterion |
11 |
681 |
Strict Avalanche Criterion
|
101 |
Eli Biham |
14 |
685 |
|
102 |
OpenPGP |
68 |
688 |
RFC 2440
|
103 |
RSA-360 |
7 |
690 |
|
104 |
Cryptochannel |
2 |
693 |
|
105 |
Random oracle |
10 |
696 |
Random oracle model
|
106 |
RSA Security |
35 |
696 |
RSA Data Security, RSA Laboratories
|
107 |
RSA-370 |
8 |
700 |
|
108 |
PMAC |
14 |
706 |
|
109 |
RSA-380 |
5 |
710 |
|
110 |
Chaffing and winnowing |
56 |
716 |
|
111 |
Certicom |
10 |
717 |
|
112 |
Dilly Knox |
10 |
720 |
Dilwyn Knox
|
113 |
Decrypt |
35 |
731 |
|
114 |
Tiger (hash) |
56 |
731 |
Tiger hash function, Tiger (cryptography)
|
115 |
RSA-390 |
6 |
732 |
|
116 |
RSA-704 |
11 |
735 |
|
117 |
RSA-640 |
19 |
735 |
|
118 |
RSA-400 |
5 |
742 |
|
119 |
GnuTLS |
27 |
743 |
|
120 |
RSA-410 |
9 |
752 |
|
121 |
CRYPTO |
18 |
756 |
|
122 |
Mitsuru Matsui |
13 |
758 |
|
123 |
Elliptic Curve DSA |
22 |
759 |
ECDSA
|
124 |
Salt (cryptography) |
29 |
759 |
|
125 |
RSA-420 |
6 |
762 |
|
126 |
RSA-768 |
15 |
767 |
|
127 |
Known-plaintext attack |
22 |
767 |
Known plaintext attack, Known plaintext
|
128 |
RSA-430 |
4 |
771 |
|
129 |
RSA-440 |
9 |
782 |
|
130 |
RSA-450 |
7 |
792 |
|
131 |
Communications Security Establishment |
69 |
796 |
|
132 |
Classical cipher |
62 |
800 |
Classical cryptography
|
133 |
CipherSaber |
5 |
804 |
|
134 |
RSA-896 |
11 |
805 |
|
135 |
RED/BLACK concept |
14 |
806 |
RED signal
|
136 |
Internet key exchange |
14 |
807 |
IKE, Internet Key Exchange
|
137 |
Adaptive chosen plaintext and chosen ciphertext attack |
0 |
809 |
|
138 |
Ciphony |
14 |
811 |
|
139 |
RSA-460 |
7 |
814 |
|
140 |
David Wheeler |
21 |
814 |
|
141 |
RSA-470 |
7 |
824 |
|
142 |
Challenge-response test |
10 |
825 |
Challenge-response system
|
143 |
Don Coppersmith |
17 |
829 |
Donald Coppersmith
|
144 |
Great Cypher |
19 |
829 |
Great Cipher
|
145 |
Book cipher |
39 |
831 |
|
146 |
RSA-480 |
11 |
834 |
|
147 |
Defence Signals Directorate |
57 |
837 |
|
148 |
George Scovell |
7 |
842 |
|
149 |
Cryptographic Message Syntax |
11 |
843 |
|
150 |
RSA-490 |
6 |
844 |
|
151 |
Ciphertext-only attack |
28 |
853 |
Ciphertext only attack, Ciphertext-only
|
152 |
RSA-500 |
9 |
854 |
|
153 |
KCDSA |
11 |
858 |
EC-KCDSA
|
154 |
Hugo Hadwiger |
14 |
859 |
|
155 |
Derek Taunt |
1 |
862 |
|
156 |
RSA-150 |
13 |
865 |
|
157 |
HAVAL |
37 |
869 |
|
158 |
MD2 |
36 |
870 |
Message Digest Algorithm 2
|
159 |
RSA-1024 |
22 |
872 |
|
160 |
[[St%E5le Schumacher Ytteborg]] |
0 |
877 |
[[St%E5le Schumacher]], Stale Schumacher
|
161 |
S-1 |
41 |
882 |
S-1 block cipher
|
162 |
Secret decoder ring |
41 |
897 |
|
163 |
Oblivious transfer |
18 |
899 |
|
164 |
S/MIME |
84 |
902 |
Smime, SMIME
|
165 |
ABA digital signature guidelines |
0 |
909 |
|
166 |
Atbash |
152 |
911 |
Atbash cipher, Atbash cypher
|
167 |
Enigmail |
38 |
914 |
|
168 |
Daniel J. Bernstein |
45 |
919 |
Dan Bernstein, D. J. Bernstein, Daniel Bernstein, Djb
|
169 |
Crypto AG |
6 |
921 |
|
170 |
Product cipher |
33 |
921 |
|
171 |
Cipherspace |
40 |
923 |
|
172 |
Link encryption |
6 |
928 |
End-to-end encryption, Bulk encryption
|
173 |
Garble |
6 |
929 |
|
174 |
Information-theoretically secure |
8 |
946 |
|
175 |
Central Security Service |
20 |
947 |
|
176 |
SOBER-128 |
0 |
950 |
|
177 |
Codebook |
139 |
950 |
Code book
|
178 |
OpenSSL |
84 |
970 |
Openssl
|
179 |
Dining cryptographers protocol |
11 |
973 |
Dining cryptographers, Dining cryptographer, Dining Cryptographers Protocol, Dining cryptographer protocol, Dining cryptographer's protocol
|
180 |
Security protocol notation |
33 |
973 |
|
181 |
Secure Communication based on Quantum Cryptography |
15 |
978 |
SECOQC
|
182 |
Type 1 encryption |
24 |
980 |
Type 1 algorithm, Type 1 product, High-grade encryption, Type I encryption
|
183 |
Visual cryptography |
17 |
986 |
|
184 |
Blind credential |
11 |
992 |
|
185 |
MARS |
38 |
996 |
Mars (cipher)
|
186 |
Cayley-Purser algorithm |
7 |
997 |
|
187 |
KY-57 |
28 |
999 |
VINSON device
|
188 |
Wide Mouth Frog |
22 |
1002 |
|
189 |
Paillier cryptosystem |
11 |
1005 |
Paillier
|
190 |
RSA-617 |
9 |
1007 |
|
191 |
Perforated sheets |
178 |
1010 |
Zygalski sheets, Perforated sheet
|
192 |
Chosen ciphertext attack |
37 |
1013 |
|
193 |
RSA-1536 |
14 |
1046 |
|
194 |
Crypto-society |
8 |
1048 |
Crypto-societies
|
195 |
Gardening (cryptanalysis) |
52 |
1048 |
|
196 |
Undeniable signature |
5 |
1055 |
|
197 |
SYSKEY |
10 |
1055 |
|
198 |
Type 2 encryption |
10 |
1060 |
Type 2 product
|
199 |
N-Hash |
11 |
1076 |
N-hash
|
200 |
Substitution-permutation network |
56 |
1087 |
SP-network, SPN, Substitution-Permutation network
|
201 |
Jerzy Rozycki |
21 |
1088 |
[[Jerzy R%F3%C5%BCycki]]
|
202 |
Template:Classical cryptography |
0 |
1093 |
Template:Classical cryptography
|
203 |
Taher ElGamal |
28 |
1107 |
Taher El-Gamal, Taher Elgamal
|
204 |
Snuffle |
30 |
1107 |
|
205 |
The Codebreakers |
37 |
1110 |
|
206 |
Snefru |
18 |
1116 |
Snefru (cryptography)
|
207 |
Yarrow algorithm |
29 |
1117 |
|
208 |
RSA-576 |
21 |
1119 |
|
209 |
VIC cipher |
21 |
1121 |
|
210 |
Martin Hellman |
23 |
1126 |
|
211 |
Peter Gutmann |
6 |
1128 |
|
212 |
GMR |
30 |
1135 |
|
213 |
802.11i |
80 |
1135 |
IEEE 802.11i, WEP2, WPA2
|
214 |
Distributed.net |
45 |
1137 |
|
215 |
Baby-step giant-step |
17 |
1142 |
BSGS
|
216 |
Certificateless cryptography |
3 |
1144 |
Certificateless Cryptography
|
217 |
Self-certifying key |
4 |
1148 |
Self-Certifying Keys
|
218 |
Shrinking generator |
20 |
1152 |
|
219 |
McEliece |
12 |
1155 |
|
220 |
MMB |
11 |
1170 |
|
221 |
Keyed-hash message authentication code |
23 |
1171 |
HMAC, Keyed-Hashing Message Authentication, Hmac
|
222 |
Cryptome |
21 |
1173 |
Cryptome.org
|
223 |
Square (cipher) |
37 |
1181 |
|
224 |
Secure key issuing cryptography |
1 |
1183 |
Secure Key Issuing Cryptography
|
225 |
Digital Fortress |
78 |
1184 |
|
226 |
Paul Kocher |
8 |
1185 |
|
227 |
TICOM |
70 |
1185 |
|
228 |
TKIP |
67 |
1195 |
|
229 |
Key server |
14 |
1197 |
|
230 |
RSA-160 |
14 |
1198 |
|
231 |
Schnorr signature |
8 |
1205 |
|
232 |
RSA-129 |
23 |
1206 |
|
233 |
AN/CYZ-10 |
10 |
1214 |
AN/CYZ-10 DTD
|
234 |
RSA-140 |
22 |
1215 |
|
235 |
Cryptogram |
67 |
1215 |
|
236 |
Cellular Message Encryption Algorithm |
10 |
1222 |
CMEA (cipher)
|
237 |
Bit-flipping attack |
7 |
1225 |
|
238 |
New Zealand Government Communications Security Bureau |
34 |
1262 |
Government Communications Security Bureau
|
239 |
Cryptographically strong |
4 |
1263 |
|
240 |
SAVILLE |
11 |
1267 |
Saville (cipher)
|
241 |
MI8 |
70 |
1268 |
|
242 |
Otway-Rees |
9 |
1274 |
|
243 |
Fortezza |
46 |
1280 |
KOV-8
|
244 |
[[Blaise de Vigen%E8re]] |
0 |
1294 |
|
245 |
Message Authentication Code |
47 |
1309 |
Message authentication code
|
246 |
Vincent Rijmen |
17 |
1310 |
|
247 |
FISH (cryptography) |
66 |
1311 |
|
248 |
Hushmail |
28 |
1327 |
|
249 |
Crib |
90 |
1334 |
Cribbing
|
250 |
RSA-130 |
18 |
1335 |
|
251 |
Hyperelliptic curve cryptography |
6 |
1355 |
|
252 |
Boris Hagelin |
12 |
1360 |
|
253 |
MD4 |
78 |
1360 |
|
254 |
Serpent (cipher) |
37 |
1364 |
Serpent encryption algorithm
|
255 |
Electronic signature |
18 |
1367 |
|
256 |
RSA-155 |
10 |
1392 |
|
257 |
PKCS |
31 |
1394 |
|
258 |
NTRUEncrypt |
12 |
1404 |
NTRU
|
259 |
Covert channel |
31 |
1411 |
|
260 |
Arne Beurling |
32 |
1412 |
|
261 |
RC6 |
63 |
1421 |
RC6 cipher, RC6 encryption algorithm
|
262 |
Babington Plot |
14 |
1437 |
Babington plot, Anthony Babington's plot
|
263 |
Jefferson disk |
7 |
1440 |
|
264 |
Gilbert Vernam |
12 |
1441 |
|
265 |
Probabilistic encryption |
9 |
1442 |
Probabilistic Encryption
|
266 |
Russian copulation |
32 |
1443 |
|
267 |
DEAL |
18 |
1447 |
|
268 |
Bernstein v. United States |
32 |
1453 |
Bernstein v. U.S. Dept. of State
|
269 |
TrueCrypt |
19 |
1454 |
Truecrypt
|
270 |
Diplomatic bag |
39 |
1456 |
Diplomatic pouch
|
271 |
SecurID |
9 |
1457 |
|
272 |
Trapdoor function |
14 |
1463 |
Trapdoor one way function, Trapdoor permutation
|
273 |
SHARK |
20 |
1468 |
Shark (cipher), SHARK (cipher)
|
274 |
CAST-256 |
34 |
1469 |
|
275 |
Certificate-based encryption |
7 |
1471 |
|
276 |
Physical security |
50 |
1472 |
Physical Security
|
277 |
KHAZAD |
19 |
1480 |
Khazad (cipher), KHAZAD (cipher)
|
278 |
Decipherment |
73 |
1480 |
Decipher, Decypher
|
279 |
Cleartext |
32 |
1481 |
Clear message, In clear, In the clear
|
280 |
Affine cipher |
41 |
1486 |
|
281 |
Red Pike |
36 |
1489 |
Red pike
|
282 |
KASUMI |
44 |
1494 |
Kasumi (cipher)
|
283 |
Key signing party |
16 |
1514 |
Keysigning party
|
284 |
Cryptographic protocol |
82 |
1514 |
|
285 |
Max Newman |
53 |
1516 |
Maxwell Newman
|
286 |
EFS |
20 |
1523 |
|
287 |
HTTPS |
300 |
1527 |
Https
|
288 |
Key-agreement protocol |
14 |
1529 |
|
289 |
RSA Factoring Challenge |
42 |
1530 |
|
290 |
Harold Keen |
4 |
1533 |
|
291 |
CrossCrypt |
6 |
1536 |
|
292 |
Bifid cipher |
17 |
1536 |
|
293 |
DigiCipher 2 |
22 |
1545 |
|
294 |
Root certificate |
15 |
1548 |
|
295 |
Cipher Block Chaining |
37 |
1548 |
|
296 |
LOKI97 |
14 |
1553 |
|
297 |
Shugborough House inscription |
34 |
1557 |
|
298 |
Key generation |
23 |
1562 |
|
299 |
Poem code |
19 |
1570 |
|
300 |
Lars Knudsen |
18 |
1574 |
Lars R. Knudsen
|
301 |
Key management |
35 |
1579 |
Key management protocol
|
302 |
Arlington Hall |
20 |
1590 |
|
303 |
Session key |
22 |
1591 |
|
304 |
Replay attack |
60 |
1595 |
|
305 |
W. T. Tutte |
16 |
1605 |
Bill Tutte
|
306 |
Glossary of telecommunications encryption terms |
33 |
1612 |
|
307 |
Anonymous publication |
6 |
1617 |
|
308 |
Cypherpunk |
135 |
1620 |
Cypherpunks
|
309 |
Communications security |
13 |
1625 |
COMSEC
|
310 |
Blinding (cryptography) |
9 |
1631 |
Blinding
|
311 |
Electronic money |
80 |
1633 |
Digital cash, EFT, Electronic cash
|
312 |
Semantic security |
16 |
1643 |
|
313 |
MISTY1 |
23 |
1644 |
MISTY-1, MISTY
|
314 |
ISAAC (cipher) |
21 |
1659 |
ISAAC, ISAAC (cryptography)
|
315 |
I. J. Good |
9 |
1665 |
I.J. Good, Irving Good
|
316 |
Clifford Cocks |
50 |
1671 |
|
317 |
DES-X |
24 |
1683 |
DESX
|
318 |
Symmetric key algorithm |
190 |
1683 |
Symmetric Algorithms, Symmetric algorithm, Symmetric key, Symmetric encryption, Symmetric key cryptography, Symmetric cypher, Shared key, Symmetric cipher
|
319 |
Merkle's Puzzles |
10 |
1684 |
Merkle's puzzles, Ralph Merkle puzzle cryptographic system
|
320 |
Tabula recta |
33 |
1685 |
|
321 |
Microdot |
35 |
1685 |
|
322 |
Secure copy |
15 |
1690 |
SCP, Scp, Secure Copy Protocol, Secure Copy
|
323 |
Twofish |
142 |
1695 |
Twofish encryption algorithm
|
324 |
Camellia (cipher) |
30 |
1704 |
|
325 |
BATON |
11 |
1708 |
|
326 |
Ross Anderson |
54 |
1709 |
Ross J. Anderson
|
327 |
Confusion and diffusion |
68 |
1716 |
Diffusion (cryptography), Confusion (cryptography), Diffusion and confusion
|
328 |
Secure Terminal Equipment |
23 |
1721 |
STE
|
329 |
MAGENTA |
14 |
1736 |
MAGENTA (cipher)
|
330 |
Ralph Merkle |
27 |
1742 |
|
331 |
Linear cryptanalysis |
77 |
1758 |
|
332 |
Helix (cipher) |
17 |
1765 |
|
333 |
TWIRL |
16 |
1770 |
|
334 |
Shafi Goldwasser |
11 |
1774 |
Shafrira Goldwasser
|
335 |
3-Way |
29 |
1777 |
3-WAY
|
336 |
Key escrow |
30 |
1779 |
|
337 |
Timing attack |
13 |
1795 |
|
338 |
PC Bruno |
36 |
1809 |
|
339 |
Cryptography newsgroups |
3 |
1829 |
Sci.crypt
|
340 |
Edward Hebern |
11 |
1838 |
Edward Hugh Hebern
|
341 |
Hans Thilo-Schmidt |
27 |
1850 |
Asch, Hans Thilo Schmidt
|
342 |
LibTom Project |
4 |
1860 |
LibTomNet, LibTomCrypt, LibTomPoly, LibTomMath
|
343 |
Arthur Scherbius |
40 |
1865 |
|
344 |
Initialization vector |
58 |
1874 |
Initialisation vector
|
345 |
Commitment scheme |
5 |
1875 |
Bit commitment
|
346 |
Adversary |
81 |
1877 |
|
347 |
Avalanche effect |
71 |
1879 |
Avalanche (cryptography)
|
348 |
Needham-Schroeder |
26 |
1892 |
|
349 |
James Ellis |
14 |
1930 |
|
350 |
David Kahn |
27 |
1931 |
|
351 |
David Wagner |
23 |
1933 |
|
352 |
NTLM |
29 |
1942 |
|
353 |
World War II cryptography |
10 |
1944 |
|
354 |
Tamper resistance |
19 |
1959 |
Tamper-resistant, Tamper resistant, Tamper-resistance
|
355 |
Tommy Flowers |
28 |
1962 |
Tommy flowers, Thomas Flowers, Thomas Harold Flowers
|
356 |
Common Scrambling Algorithm |
22 |
1973 |
|
357 |
Crypto system |
11 |
1975 |
Cryptosystem
|
358 |
Template:Block ciphers |
2 |
2003 |
Template:Block ciphers
|
359 |
Digital timestamping |
16 |
2011 |
|
360 |
Chosen plaintext attack |
56 |
2016 |
Chosen plaintext, Chosen-text attack, Chosen-plaintext attack, Chosen-plaintext, Adaptive chosen-plaintext attack, Adaptive chosen plaintext attack
|
361 |
Confidentiality |
100 |
2056 |
Data confidentiality
|
362 |
Deniable encryption |
117 |
2060 |
Deniable Encryption
|
363 |
Ron Rivest |
72 |
2061 |
Rivest, Ronald Rivest, Ronald L. Rivest
|
364 |
Permutation cipher |
43 |
2076 |
|
365 |
The Gold Bug |
81 |
2121 |
|
366 |
Digital Signature Algorithm |
148 |
2167 |
DSA
|
367 |
Meet-in-the-middle attack |
116 |
2170 |
|
368 |
Block size (cryptography) |
54 |
2183 |
|
369 |
Adaptive chosen ciphertext attack |
36 |
2203 |
Adaptive chosen-ciphertext attack
|
370 |
Knapsack problem |
125 |
2223 |
0/1 knapsack problem
|
371 |
Harvest (computer) |
3 |
2228 |
Harvest computer
|
372 |
[[Biuro Szyfr%F3w]] |
0 |
2238 |
Biuro Szyfrow
|
373 |
Linear feedback shift register |
67 |
2242 |
LFSR
|
374 |
Challenge-response authentication |
36 |
2274 |
|
375 |
Discrete logarithm |
77 |
2293 |
Discrete log problem, Discrete logarithm problem, Discrete logarithms, Discrete log
|
376 |
Key distribution center |
16 |
2297 |
KDC
|
377 |
ID-based cryptography |
12 |
2301 |
ID Based Cryptography
|
378 |
Whitfield Diffie |
34 |
2304 |
Diffie
|
379 |
Phil Zimmermann |
28 |
2321 |
PhilZimmermann, Philip Zimmermann
|
380 |
40-bit encryption |
33 |
2334 |
40 bit encryption
|
381 |
Blum Blum Shub |
117 |
2340 |
|
382 |
Bruce Schneier |
74 |
2342 |
Schneier
|
383 |
Key derivation function |
5 |
2370 |
|
384 |
Merkle-Hellman |
40 |
2370 |
|
385 |
Content-scrambling system |
103 |
2426 |
Content Scrambling System, Content scrambling system
|
386 |
Triple DES |
288 |
2454 |
3DES, Triple-DES
|
387 |
Scrambler |
18 |
2458 |
Descrambler
|
388 |
Horst Feistel |
26 |
2462 |
|
389 |
JN-25 |
45 |
2478 |
|
390 |
Zeroise |
13 |
2504 |
Zeroization
|
391 |
RSA-2048 |
27 |
2509 |
|
392 |
Al Bhed |
19 |
2510 |
|
393 |
Advanced Encryption Standard process |
110 |
2512 |
AES process, AES competition, AES contest, Advanced Encryption Standard competition, AES candidate
|
394 |
Mod n cryptanalysis |
28 |
2531 |
Mod-n cryptanalysis
|
395 |
Rubber-hose cryptanalysis |
49 |
2543 |
Rubber hose cryptanalysis
|
396 |
Leonard Adleman |
43 |
2560 |
Len Adleman, Adleman, Leonard M. Adleman, Adleman, Leonard
|
397 |
One way function |
32 |
2565 |
One-way, One way
|
398 |
Self-signed certificate |
5 |
2570 |
Self signed certificate
|
399 |
Security engineering |
101 |
2579 |
|
400 |
DRYAD |
3 |
2595 |
DRYAD (Cryptography)
|
401 |
RIPEMD |
118 |
2604 |
RIPEMD-160
|
402 |
[[Le chiffre ind%E9chiffrable]] |
0 |
2605 |
The unbreakable cypher, Le chifffre indechiffrable
|
403 |
[[%C9tienne Bazeries]] |
0 |
2633 |
Bazeries, Etienne Bazeries
|
404 |
Key authentication |
29 |
2643 |
|
405 |
Lorenz cypher |
48 |
2646 |
Tunny (cryptography), Lorenz cipher, Fish cyphers, TUNNY, Fish ciphers, Lorentz Cipher, Lorentz Cypher, Lorenz Machine, Lorentz Machine
|
406 |
The Code Book |
12 |
2658 |
|
407 |
Unicity distance |
33 |
2667 |
Spurious key
|
408 |
Adi Shamir |
126 |
2678 |
|
409 |
The Magic Words are Squeamish Ossifrage |
67 |
2685 |
Squeamish ossifrage
|
410 |
TWINKLE |
10 |
2690 |
|
411 |
SHACAL |
19 |
2710 |
SHACAL-1, Shacal-2
|
412 |
Room 40 |
33 |
2720 |
|
413 |
Dictionary attack |
58 |
2734 |
|
414 |
Kasiski examination |
43 |
2760 |
Kasiski test
|
415 |
RC5 |
82 |
2767 |
RC5 cipher, RC5 encryption algorithm
|
416 |
MD5CRK |
78 |
2781 |
|
417 |
CAST-128 |
55 |
2790 |
CAST5, CAST, CAST-5
|
418 |
Pseudonymity |
78 |
2790 |
|
419 |
Friedrich Kasiski |
28 |
2803 |
Kasiski, Friedrich Wilhelm Kasiski
|
420 |
Dmitry Sklyarov |
91 |
2832 |
Dmitri Sklyarov, Dimitri Sklyarov, Dimitri Skylarov, Sklyarov, Dimitry Sklyarov, Dimitry Sklyarov, Dimitry Sklyarov
|
421 |
Index of coincidence |
39 |
2858 |
Coincidence counting
|
422 |
Frank Rowlett |
17 |
2867 |
|
423 |
Padding (cryptography) |
30 |
2881 |
|
424 |
Secure cryptoprocessor |
43 |
2889 |
|
425 |
NewDES |
32 |
2901 |
|
426 |
Auguste Kerckhoffs |
32 |
2927 |
|
427 |
LOKI |
16 |
2930 |
LOKI91, LOKI89
|
428 |
ElGamal discrete log cryptosystem |
91 |
2938 |
Elgamal discrete logarithm cryptosystem, El Gamal discrete log cryptosystem, ElGamal, El Gamal, Elgamal, Elgamal discrete log cryptosystem
|
429 |
SIGINT |
89 |
2944 |
Signals intelligence, Sigint, Signals Intelligence, Signal intelligence
|
430 |
Man in the middle attack |
151 |
2950 |
Man-in-the-middle attack, Man in the middle, MITM
|
431 |
Cryptonomicon |
366 |
2986 |
Neal Stephenson/Cryptonomicon
|
432 |
Stream cipher |
215 |
2999 |
Key stream, Combiner-type algorithm
|
433 |
Kryptos |
195 |
3030 |
|
434 |
M-94 |
15 |
3032 |
M-94 (cypher)
|
435 |
Louis W. Tordella |
14 |
3060 |
|
436 |
Hashcash |
49 |
3076 |
|
437 |
GOST |
38 |
3123 |
|
438 |
Laurence Safford |
4 |
3148 |
|
439 |
John Tiltman |
21 |
3149 |
|
440 |
Certificate authority |
137 |
3164 |
Certificate Authority
|
441 |
Secure multiparty computation |
21 |
3172 |
Millionaire problem
|
442 |
Secure shell |
118 |
3192 |
SSH, Secure Shell, Ssh
|
443 |
Polybius square |
61 |
3213 |
|
444 |
Birthday attack |
283 |
3250 |
|
445 |
Geheimfernschreiber |
108 |
3255 |
STURGEON (cryptography)
|
446 |
MacGuffin (cipher) |
33 |
3265 |
|
447 |
Agnes Meyer Driscoll |
21 |
3301 |
|
448 |
Wi-Fi Protected Access |
342 |
3319 |
|
449 |
Wired Equivalent Privacy |
54 |
3326 |
WEP
|
450 |
RC2 |
99 |
3383 |
|
451 |
Bomba (cryptography) |
200 |
3402 |
|
452 |
The Alphabet Cipher |
18 |
3442 |
|
453 |
Power analysis |
8 |
3461 |
|
454 |
Feistel cipher |
59 |
3491 |
Feistel network, Feistel scheme, Feistel
|
455 |
Numbers station |
153 |
3510 |
Numbers stations, Number station
|
456 |
OpenSSH |
85 |
3512 |
Openssh
|
457 |
ADFGVX cipher |
34 |
3542 |
ADFGVX
|
458 |
Certificate revocation list |
17 |
3553 |
CRL, Certificate Revocation List, Compromised key list
|
459 |
Trusted third party |
30 |
3564 |
Trusted Third Party
|
460 |
Secure channel |
35 |
3599 |
|
461 |
NESSIE |
34 |
3611 |
|
462 |
Brute force attack |
298 |
3619 |
Combinatorial explosion
|
463 |
KW-37 |
20 |
3688 |
KWR-37, KWT-37
|
464 |
Skipjack (cipher) |
125 |
3692 |
Skipjack encryption algorithm
|
465 |
Illegal prime |
114 |
3706 |
Illegal prime number
|
466 |
Blind signature |
21 |
3755 |
|
467 |
KL-7 |
58 |
3814 |
|
468 |
Autokey cipher |
99 |
3820 |
|
469 |
Invisible ink |
110 |
3893 |
|
470 |
Lucifer (cipher) |
58 |
3954 |
Lucifer cipher
|
471 |
EFF DES cracker |
90 |
3960 |
Deep Crack, Deep crack, DES cracker
|
472 |
Weak key |
106 |
3961 |
|
473 |
Government Communications Headquarters |
52 |
3971 |
GCHQ, GC&CS, Government Code and Cypher School, Government Code and Cipher School
|
474 |
Johannes Trithemius |
59 |
4041 |
|
475 |
Key exchange |
32 |
4058 |
|
476 |
TEMPEST |
152 |
4065 |
Van Eck Phreaking, Emission security, Van Eck radiation, Emissions security, EMSEC
|
477 |
Piling-up lemma |
24 |
4076 |
Piling up lemma
|
478 |
Kerckhoffs' law |
29 |
4087 |
Kerckhoff's principle, Kerckhoffs' principle, Shannon's maxim, Kerkhoffs' law, Kerkhoffs law, Kerckhoffs law, Kirckhoffs law, Kerkchoffs law, Kerchoffs law, Kerchoff's law, Kerchoff's Law, Shannon's Maxim, Kerchoffs' Law, Kerckhoffs' Law, Kerchkoffs' Law, Kerkhoffs' Law
|
479 |
XTEA |
78 |
4138 |
|
480 |
PURPLE |
28 |
4151 |
Purple code, Purple (cryptography)
|
481 |
Polyalphabetic cipher |
141 |
4159 |
Polyalphabetic substitution
|
482 |
STU-III |
44 |
4236 |
|
483 |
Typex |
185 |
4242 |
Type X, TypeX
|
484 |
KW-26 |
35 |
4250 |
|
485 |
Alice and Bob |
87 |
4303 |
Characters in cryptography
|
486 |
X.509 |
293 |
4393 |
|
487 |
Trench code |
6 |
4412 |
|
488 |
International Data Encryption Algorithm |
183 |
4461 |
IDEA encryption algorithm, IDEA (cipher), Idea encryption
|
489 |
Madryga |
21 |
4492 |
|
490 |
Tiny Encryption Algorithm |
32 |
4516 |
TEA
|
491 |
Steganalysis |
44 |
4527 |
|
492 |
Kerberos (protocol) |
231 |
4528 |
|
493 |
Clipper chip |
49 |
4545 |
Clipper Chip
|
494 |
Encryption |
635 |
4549 |
CipheR, Cipher, Cyphertext, Ciphertext, Cipher text, Decryption, Encryption key, Encryption algorithm, Codetext, Encrypt, Encrypted, Encipher
|
495 |
Crypto-anarchism |
159 |
4554 |
Crypto-anarchy
|
496 |
Cryptography standards |
22 |
4621 |
|
497 |
Information security |
147 |
4644 |
Information systems security, Information assurance, INFOSEC, It security
|
498 |
Scytale |
116 |
4652 |
Skytale
|
499 |
Public key certificate |
98 |
4773 |
Digital certificate, Digital Certificate, Identity certificate, Digital identity certificate
|
500 |
Block cipher |
297 |
4828 |
Codebook algorithm
|
501 |
FEAL |
36 |
4829 |
|
502 |
Differential cryptanalysis |
171 |
4856 |
Differential attack
|
503 |
Khufu and Khafre |
62 |
4898 |
Khafre (cipher), Khufu (cipher)
|
504 |
Authentication |
240 |
4925 |
Authenticate
|
505 |
Marian Rejewski |
183 |
4990 |
|
506 |
List of cryptographic key types |
4 |
5044 |
Transmission security key
|
507 |
Playfair cipher |
50 |
5154 |
Playfair, Playfair square
|
508 |
Leone Battista Alberti |
58 |
5229 |
Leone Battista Alrerti, Leon Battista Alberti, Alberti, Leone Battista, Leone Alberti
|
509 |
Plaintext |
108 |
5243 |
|
510 |
Joseph Rochefort |
5 |
5292 |
John Joseph Rochefort
|
511 |
Transport Layer Security |
198 |
5301 |
Secure Sockets Layer, Transport Layer Security Protocol, Transport layer security, Secure Socket Layer
|
512 |
Block cipher modes of operation |
145 |
5391 |
Electronic codebook, Cipher-block chaining, Cipher feedback, Output feedback, Counter mode, Modes of operation, Block cipher mode of operation
|
513 |
Claude E. Shannon |
200 |
5407 |
Claude Shannon, Claude Elwood Shannon
|
514 |
Code talkers |
140 |
5476 |
Codetalker, Navajo code, Codetalkers
|
515 |
SAFER |
35 |
5605 |
SAFER-K, SAFER (cipher), SAFER SK, SAFER plus, SAFER plus plus
|
516 |
EKMS |
34 |
5662 |
Electronic Key Management System
|
517 |
Passphrase |
25 |
5716 |
Pass-phrase, Pass phrase
|
518 |
FNBDT |
18 |
5772 |
|
519 |
Straddling checkerboard |
24 |
5879 |
|
520 |
RC4 |
213 |
5957 |
RC4 Cipher, ARCFOUR, RC4 cipher, RC4 (cipher)
|
521 |
Cryptographically secure pseudo-random number generator |
134 |
5972 |
CSPRNG
|
522 |
Side channel attack |
31 |
6001 |
|
523 |
Pseudorandom number generator |
226 |
6097 |
Pseudorandom number generators, Pseudo-random number generator, Pseudorandom sequence, PRNG, Pseudo Random, Pseudo-random, Pseudo-randomness
|
524 |
Beale ciphers |
85 |
6121 |
Beale Ciphers
|
525 |
GNU Privacy Guard |
69 |
6251 |
Gnu Privacy Guard, GPG, GnuPG, Gnupg, GNUPG
|
526 |
Substitution box |
48 |
6276 |
S-box, Cryptography/s-box, Substitution boxes
|
527 |
Zero-knowledge proof |
54 |
6332 |
Zero knowledge proof, Zero-knowledge
|
528 |
SIGSALY |
32 |
6480 |
|
529 |
Bombe |
698 |
6592 |
|
530 |
Herbert Yardley |
17 |
6694 |
Herbert O. Yardley
|
531 |
Hebern rotor machine |
62 |
6767 |
Hebern Rotor Machine
|
532 |
Web of trust |
79 |
6797 |
Web of Trust
|
533 |
Elliptic curve cryptography |
218 |
6859 |
Elliptical Curve Cryptography
|
534 |
Blowfish (cipher) |
451 |
6893 |
Blowfish encryption algorithm
|
535 |
Abraham Sinkov |
9 |
6920 |
|
536 |
Frequency analysis |
263 |
7111 |
|
537 |
Integer factorization |
297 |
7176 |
Prime factorization, Prime factorisation, Prime decomposition, Integer factorization problem, Integer factorisation
|
538 |
Public-key cryptography |
263 |
7241 |
Private key, Public key, Public key cryptography, Asymmetric key cryptography, Public key encyption, Public key crytography, Public key encryption, Public-key encryption, Public-key, PKC, Non-secret encryption
|
539 |
A5/1 |
59 |
7268 |
A5 (cryptography)
|
540 |
Computer surveillance |
73 |
7278 |
|
541 |
Asymmetric key algorithm |
239 |
7280 |
Asymmetric Algorithms, Asymmetric algorithm, Public key algorithm, Asymmetric key, Asymmetric key encryption algorithm, Asymmetric key encryption, Asymmetric cryptography
|
542 |
Traffic analysis |
72 |
7292 |
|
543 |
Key (cryptography) |
116 |
7368 |
CryptographY/Keys, Cryptography/Key, Secret key, Cryptographic keys, Cryptographic key
|
544 |
Caesar cipher |
173 |
7402 |
Shift cipher, Caesar shift cipher
|
545 |
Leo Marks |
22 |
7537 |
Leopold Samuel Marks
|
546 |
MD5 |
985 |
7635 |
Md5, MD5 - A Message Digest Algorithm, Md5sum
|
547 |
DES supplementary material |
20 |
7677 |
|
548 |
Code (cryptography) |
73 |
7701 |
Codetext
|
549 |
Transposition cipher |
122 |
7779 |
Transposition (cryptography), Columnar disposition, Transposition (cipher)
|
550 |
Cryptographic engineering |
27 |
7785 |
|
551 |
Diffie-Hellman key exchange |
99 |
7798 |
Diffie-Hellman, Diffie Hellman, Diffie-Hellman-Merkle key exchange, Diffie-Hellman-Merkle
|
552 |
Advanced Encryption Standard |
398 |
7856 |
AES, Rijndael, Rijndael encryption algorithm
|
553 |
Running key cipher |
27 |
7964 |
|
554 |
Key signature |
262 |
8157 |
|
555 |
DeCSS |
294 |
8253 |
DeCSS source code, Decss
|
556 |
Security through obscurity |
98 |
8295 |
Security by obscurity
|
557 |
Key size |
84 |
8328 |
Cryptography/key length, Cryptographic key length, Key length
|
558 |
[[Vigen%E8re cipher]] |
0 |
8473 |
[[Vigen%E8re Cipher]], [[Vigen%E8re cypher]], Vigenere cipher
|
559 |
IPsec |
63 |
8654 |
RFC 2401, IPSEC, Authentication Header, Encapsulating Security Payload, IPSec, IPsec implementations
|
560 |
SIGABA |
103 |
8823 |
Sigaba
|
561 |
ROT13 |
220 |
9050 |
Rot13, ROT-13, ROT-47, Rot47, Rot-13, Rot-47, ROT47, ROT 13, Ebg13
|
562 |
Burrows-Abadi-Needham logic |
15 |
9097 |
BAN logic, BAN Logic
|
563 |
VENONA project |
141 |
9320 |
VENONA, Venona, VENONA Project, Venona project, Venona Project
|
564 |
Cryptographic hash function |
364 |
9394 |
Message digest, Cryptographic hash, Cryptographic message digest, One-way hash
|
565 |
CRYPTREC |
37 |
9428 |
|
566 |
Snake oil (cryptography) |
48 |
9433 |
Snake oil cryptography
|
567 |
Public key infrastructure |
139 |
9446 |
PKI, Public Key Infrastructure, Pki
|
568 |
Zimmermann Telegram |
307 |
9474 |
Zimmermann telegram, Zimmerman telegram, Zimmerman Note, The Zimmermann Telegram
|
569 |
Bletchley Park |
505 |
9724 |
Bletchley Park Museum, Station X
|
570 |
XSL attack |
90 |
9961 |
|
571 |
Colossus computer |
430 |
9990 |
Colossus (computer)
|
572 |
SHA family |
87 |
10059 |
SHA, SHA1, SHA-256, SHA-384, SHA-512, SHA-1, Secure Hash Algorithm family, Secure Hash Algorithm, SHA-0, SHA512
|
573 |
Password cracking |
155 |
10256 |
|
574 |
Rabin cryptosystem |
101 |
10488 |
|
575 |
Secret sharing |
70 |
10531 |
Key splitting
|
576 |
National Security Agency |
401 |
10979 |
NSA, Armed Forces Security Agency, AFSA, No such agency, The Puzzle Palace
|
577 |
Quadratic sieve |
53 |
11164 |
Multiple Polynomial Quadratic Sieve
|
578 |
Fritz-chip |
116 |
11332 |
|
579 |
List of cryptographers |
38 |
11430 |
Cryptographer, Cryptographers, Cryptologist
|
580 |
Wikipedia:WikiProject Cryptography |
59 |
11621 |
User:Matt Crypto/prop, Wikipedia:WikiProject Cryptology
|
581 |
Digital signature |
320 |
11707 |
Digital signatures, Digitally Signed
|
582 |
Export of cryptography |
63 |
11768 |
|
583 |
Elizebeth Friedman |
22 |
11786 |
Elizabeth Friedman
|
584 |
Steganography |
691 |
11796 |
Digital watermark, Secret writing, Stegonagraphy, Stegotext
|
585 |
William F. Friedman |
66 |
11954 |
William Friedman, William Frederick Friedman, Wolfe Frederick Friedman
|
586 |
ECHELON |
908 |
12424 |
EcheloN, Eschelon
|
587 |
Magic (cryptography) |
98 |
12477 |
Magic cryptography
|
588 |
Bazeries cylinder |
9 |
12555 |
Bazeries Cylinder
|
589 |
Rotor machine |
318 |
12564 |
Rotor cypher machine
|
590 |
RSA |
893 |
13206 |
RSA Cryptosystem
|
591 |
RSA number |
83 |
13269 |
RSA numbers
|
592 |
Computer insecurity |
62 |
13922 |
|
593 |
Electronic voting |
180 |
14348 |
E-voting, EVoting, E voting, Computer voting, Electronic Voting, Online voting
|
594 |
Anonymous remailer |
78 |
14588 |
Anonymous Remailer, Remailer
|
595 |
Alan Turing |
1481 |
14612 |
Turing, A.M., Alan Mathison Turing
|
596 |
NSA encryption systems |
43 |
15124 |
|
597 |
Password |
155 |
15628 |
Passcode
|
598 |
Quantum cryptography |
394 |
16078 |
Quantum Cryptography
|
599 |
Books on cryptography |
56 |
16352 |
|
600 |
M-209 |
17 |
16425 |
|
601 |
Cryptography |
1202 |
17718 |
CryptologY, CryptographY, Cryptology, CryptographY/Hashfunctions, Cryptographic, Codes and ciphers, Decrypting, Crypto, Data encryption, Cyptography
|
602 |
Substitution cipher |
257 |
17897 |
Substitution ciphers, Substitution alphabet, Letter-substitution cipher, Simple substitution cipher, Monoalphabetic substitution cipher
|
603 |
One-time pad |
319 |
18083 |
OneTimePads, One time pads, One time pad, Vernam cipher
|
604 |
Cryptanalysis |
1985 |
18187 |
CryptanalysiS, Cryptanalytic, Cryptoanalysis, Codebreaking, Codebreaker, Cryptanalyst, Code-breaking, Cryptanalysts
|
605 |
Topics in cryptography |
373 |
18270 |
Topics in Cryptography
|
606 |
History of cryptography |
1435 |
19824 |
|
607 |
Hardware random number generator |
170 |
21918 |
True random number generator, Random device, Entropy pool, TRNG, True Random Number Generator
|
608 |
Cryptanalysis of the Enigma |
1985 |
22449 |
|
609 |
Digital rights management |
1162 |
23687 |
Digital Rights Management, Digital-rights management, Digital restrictions management, Digital Restrictions Management
|
610 |
Ultra |
535 |
26381 |
UltrA, Ultra secret, ULTRA
|
611 |
Pretty Good Privacy |
123 |
28574 |
PrettyGoodPrivacy, PGP, Pgp
|
612 |
Data Encryption Standard |
394 |
29888 |
DataEncryptionStandard, Data Encryption Algorithm, DES
|
613 |
Enigma machine |
6281 |
32433 |
Naval Engima, Enigma code machine, Enigma (machine), ENIGMA, Enigma cryptography machine, Enigma code, Enigma cipher machine, Enigma cypher machine, Enigma cipher, Enigma cypher, Naval Enigma, Enigma Machine
|
614 |
List of cryptography topics |
181 |
33111 |
List of cryptology topics
|