Jump to content

User:Matt Crypto/CryptoStats/ArticleSize

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Template namespace initialisation script (talk | contribs) at 02:51, 23 December 2004. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Rank Article Hits Size (bytes) Redirects
1 Sftp 27 18
2 Quantum computing 226 30
3 Voynich Manuscript 344 33
4 Secure File Transfer Protocol 0 44
5 FreeLIP 10 134
6 Josef Pieprzyk 25 161
7 OTFE 3 175
8 Secrets and Lies 11 198
9 Superencryption 10 202
10 Codress message 5 206
11 Scott Vanstone 3 213
12 Message forgery 9 240
13 Frank A. Stevenson 5 268
14 Attacker 9 285
15 Direct anonymous attestation 9 285
16 CCMP 19 286
17 AxCrypt 15 299
18 Certification path validation algorithm 10 306
19 Privacy-enhanced Electronic Mail 14 308 Privacy-enhanced electronic mail, Privacy Enhanced Mail
20 Journal of Cryptology 6 320 Journal of cryptology
21 David Chaum 23 339
22 FIREFLY 4 340
23 COMSEC equipment 10 340
24 Cryptanalytic computer 6 341
25 Financial cryptography 26 347
26 Collision attack 88 348
27 Joseph Mauborgne 11 352
28 Solomon Kullback 7 366
29 Cryptomathic 5 367
30 Yuliang Zheng 11 373
31 Preimage attack 73 386
32 CAcert 20 392
33 HAS-160 6 395
34 SEED 84 419 SEED (cipher)
35 Cryptology ePrint Archive 7 425 EPrint
36 SEAL (cipher) 25 436 SEAL (cryptography)
37 Cryptologia 22 451
38 Simple public key infrastructure 13 462 Simple Public Key Infrastructure, SPKI
39 RSA-170 12 476
40 Zimmermann-Sassaman key-signing protocol 0 479 Zimmmermann-Sassaman key signing protocol, Zimmerman-Sassaman protocol, Zimmerman-Sassaman key-signing protocol
41 RSA-180 6 486
42 Internet Security Association and Key Management Protocol 17 486 ISAKMP
43 Dorabella Cipher 56 490
44 Cardan grille 38 494
45 Online Certificate Status Protocol 15 495 Ocsp, OCSP
46 RSA-190 7 496
47 Type 3 encryption 6 500 Type 3 algorithm
48 CryptoStick 6 505
49 RSA-200 9 506
50 RSA-100 25 506
51 International Association for Cryptologic Research 3 512 IACR
52 Joan Daemen 13 512
53 S/KEY 7 514 S/Key
54 CryptoBuddy 5 516
55 RSA-210 8 516
56 Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age 17 525
57 RSA-220 6 526
58 RSA-110 12 527
59 Cover (telecommunications) 4 545
60 RSA-120 14 545
61 National Cryptologic Museum 108 545 National cryptologic museum
62 RSA-230 9 548
63 List of famous ciphertexts 63 548 Famous ciphertexts
64 RSA-232 7 550
65 RSA-250 10 556
66 RSA-240 7 558
67 Stunnel 15 564
68 Robert Tappan Morris, Sr. 0 568
69 RSA-260 7 578
70 Null cipher 53 579 Null cypher
71 Iraqi block cipher 34 580 Iraqi Block Cipher
72 RSA-270 8 588
73 Key schedule 40 594 Key scheduling, Subkey
74 RSA-280 7 598
75 A5/2 33 601
76 RSA-290 5 608
77 WHIRLPOOL 5 610 Whirlpool (hash), Whirlpool (algorithm)
78 RSA-300 8 618
79 VINSON 7 626
80 Type 4 encryption 12 627 Type 4 algorithm
81 Henryk Zygalski 22 627
82 Malleability 24 633 Malleable, Maellability
83 Pike (cipher) 18 637 Pike (cryptography)
84 OMAC 25 637
85 RSA-309 6 639
86 RSA-310 10 640
87 H.235 4 648
88 RSA-320 6 650
89 WAKE 17 650
90 Niels Ferguson 12 659
91 RSA-330 9 660
92 Communication Theory of Secrecy Systems 27 662
93 [[Cryptographie ind%E9chiffrable]] 0 663
94 Simple XOR Cipher 4 666
95 Passive attack 8 667
96 KOV-14 8 668 Fortezza Plus
97 RSA-340 6 670
98 Torus based cryptography 7 677
99 RSA-350 8 680
100 Strict avalanche criterion 11 681 Strict Avalanche Criterion
101 Eli Biham 14 685
102 OpenPGP 68 688 RFC 2440
103 RSA-360 7 690
104 Cryptochannel 2 693
105 Random oracle 10 696 Random oracle model
106 RSA Security 35 696 RSA Data Security, RSA Laboratories
107 RSA-370 8 700
108 PMAC 14 706
109 RSA-380 5 710
110 Chaffing and winnowing 56 716
111 Certicom 10 717
112 Dilly Knox 10 720 Dilwyn Knox
113 Decrypt 35 731
114 Tiger (hash) 56 731 Tiger hash function, Tiger (cryptography)
115 RSA-390 6 732
116 RSA-704 11 735
117 RSA-640 19 735
118 RSA-400 5 742
119 GnuTLS 27 743
120 RSA-410 9 752
121 CRYPTO 18 756
122 Mitsuru Matsui 13 758
123 Elliptic Curve DSA 22 759 ECDSA
124 Salt (cryptography) 29 759
125 RSA-420 6 762
126 RSA-768 15 767
127 Known-plaintext attack 22 767 Known plaintext attack, Known plaintext
128 RSA-430 4 771
129 RSA-440 9 782
130 RSA-450 7 792
131 Communications Security Establishment 69 796
132 Classical cipher 62 800 Classical cryptography
133 CipherSaber 5 804
134 RSA-896 11 805
135 RED/BLACK concept 14 806 RED signal
136 Internet key exchange 14 807 IKE, Internet Key Exchange
137 Adaptive chosen plaintext and chosen ciphertext attack 0 809
138 Ciphony 14 811
139 RSA-460 7 814
140 David Wheeler 21 814
141 RSA-470 7 824
142 Challenge-response test 10 825 Challenge-response system
143 Don Coppersmith 17 829 Donald Coppersmith
144 Great Cypher 19 829 Great Cipher
145 Book cipher 39 831
146 RSA-480 11 834
147 Defence Signals Directorate 57 837
148 George Scovell 7 842
149 Cryptographic Message Syntax 11 843
150 RSA-490 6 844
151 Ciphertext-only attack 28 853 Ciphertext only attack, Ciphertext-only
152 RSA-500 9 854
153 KCDSA 11 858 EC-KCDSA
154 Hugo Hadwiger 14 859
155 Derek Taunt 1 862
156 RSA-150 13 865
157 HAVAL 37 869
158 MD2 36 870 Message Digest Algorithm 2
159 RSA-1024 22 872
160 [[St%E5le Schumacher Ytteborg]] 0 877 [[St%E5le Schumacher]], Stale Schumacher
161 S-1 41 882 S-1 block cipher
162 Secret decoder ring 41 897
163 Oblivious transfer 18 899
164 S/MIME 84 902 Smime, SMIME
165 ABA digital signature guidelines 0 909
166 Atbash 152 911 Atbash cipher, Atbash cypher
167 Enigmail 38 914
168 Daniel J. Bernstein 45 919 Dan Bernstein, D. J. Bernstein, Daniel Bernstein, Djb
169 Crypto AG 6 921
170 Product cipher 33 921
171 Cipherspace 40 923
172 Link encryption 6 928 End-to-end encryption, Bulk encryption
173 Garble 6 929
174 Information-theoretically secure 8 946
175 Central Security Service 20 947
176 SOBER-128 0 950
177 Codebook 139 950 Code book
178 OpenSSL 84 970 Openssl
179 Dining cryptographers protocol 11 973 Dining cryptographers, Dining cryptographer, Dining Cryptographers Protocol, Dining cryptographer protocol, Dining cryptographer's protocol
180 Security protocol notation 33 973
181 Secure Communication based on Quantum Cryptography 15 978 SECOQC
182 Type 1 encryption 24 980 Type 1 algorithm, Type 1 product, High-grade encryption, Type I encryption
183 Visual cryptography 17 986
184 Blind credential 11 992
185 MARS 38 996 Mars (cipher)
186 Cayley-Purser algorithm 7 997
187 KY-57 28 999 VINSON device
188 Wide Mouth Frog 22 1002
189 Paillier cryptosystem 11 1005 Paillier
190 RSA-617 9 1007
191 Perforated sheets 178 1010 Zygalski sheets, Perforated sheet
192 Chosen ciphertext attack 37 1013
193 RSA-1536 14 1046
194 Crypto-society 8 1048 Crypto-societies
195 Gardening (cryptanalysis) 52 1048
196 Undeniable signature 5 1055
197 SYSKEY 10 1055
198 Type 2 encryption 10 1060 Type 2 product
199 N-Hash 11 1076 N-hash
200 Substitution-permutation network 56 1087 SP-network, SPN, Substitution-Permutation network
201 Jerzy Rozycki 21 1088 [[Jerzy R%F3%C5%BCycki]]
202 Template:Classical cryptography 0 1093 Template:Classical cryptography
203 Taher ElGamal 28 1107 Taher El-Gamal, Taher Elgamal
204 Snuffle 30 1107
205 The Codebreakers 37 1110
206 Snefru 18 1116 Snefru (cryptography)
207 Yarrow algorithm 29 1117
208 RSA-576 21 1119
209 VIC cipher 21 1121
210 Martin Hellman 23 1126
211 Peter Gutmann 6 1128
212 GMR 30 1135
213 802.11i 80 1135 IEEE 802.11i, WEP2, WPA2
214 Distributed.net 45 1137
215 Baby-step giant-step 17 1142 BSGS
216 Certificateless cryptography 3 1144 Certificateless Cryptography
217 Self-certifying key 4 1148 Self-Certifying Keys
218 Shrinking generator 20 1152
219 McEliece 12 1155
220 MMB 11 1170
221 Keyed-hash message authentication code 23 1171 HMAC, Keyed-Hashing Message Authentication, Hmac
222 Cryptome 21 1173 Cryptome.org
223 Square (cipher) 37 1181
224 Secure key issuing cryptography 1 1183 Secure Key Issuing Cryptography
225 Digital Fortress 78 1184
226 Paul Kocher 8 1185
227 TICOM 70 1185
228 TKIP 67 1195
229 Key server 14 1197
230 RSA-160 14 1198
231 Schnorr signature 8 1205
232 RSA-129 23 1206
233 AN/CYZ-10 10 1214 AN/CYZ-10 DTD
234 RSA-140 22 1215
235 Cryptogram 67 1215
236 Cellular Message Encryption Algorithm 10 1222 CMEA (cipher)
237 Bit-flipping attack 7 1225
238 New Zealand Government Communications Security Bureau 34 1262 Government Communications Security Bureau
239 Cryptographically strong 4 1263
240 SAVILLE 11 1267 Saville (cipher)
241 MI8 70 1268
242 Otway-Rees 9 1274
243 Fortezza 46 1280 KOV-8
244 [[Blaise de Vigen%E8re]] 0 1294
245 Message Authentication Code 47 1309 Message authentication code
246 Vincent Rijmen 17 1310
247 FISH (cryptography) 66 1311
248 Hushmail 28 1327
249 Crib 90 1334 Cribbing
250 RSA-130 18 1335
251 Hyperelliptic curve cryptography 6 1355
252 Boris Hagelin 12 1360
253 MD4 78 1360
254 Serpent (cipher) 37 1364 Serpent encryption algorithm
255 Electronic signature 18 1367
256 RSA-155 10 1392
257 PKCS 31 1394
258 NTRUEncrypt 12 1404 NTRU
259 Covert channel 31 1411
260 Arne Beurling 32 1412
261 RC6 63 1421 RC6 cipher, RC6 encryption algorithm
262 Babington Plot 14 1437 Babington plot, Anthony Babington's plot
263 Jefferson disk 7 1440
264 Gilbert Vernam 12 1441
265 Probabilistic encryption 9 1442 Probabilistic Encryption
266 Russian copulation 32 1443
267 DEAL 18 1447
268 Bernstein v. United States 32 1453 Bernstein v. U.S. Dept. of State
269 TrueCrypt 19 1454 Truecrypt
270 Diplomatic bag 39 1456 Diplomatic pouch
271 SecurID 9 1457
272 Trapdoor function 14 1463 Trapdoor one way function, Trapdoor permutation
273 SHARK 20 1468 Shark (cipher), SHARK (cipher)
274 CAST-256 34 1469
275 Certificate-based encryption 7 1471
276 Physical security 50 1472 Physical Security
277 KHAZAD 19 1480 Khazad (cipher), KHAZAD (cipher)
278 Decipherment 73 1480 Decipher, Decypher
279 Cleartext 32 1481 Clear message, In clear, In the clear
280 Affine cipher 41 1486
281 Red Pike 36 1489 Red pike
282 KASUMI 44 1494 Kasumi (cipher)
283 Key signing party 16 1514 Keysigning party
284 Cryptographic protocol 82 1514
285 Max Newman 53 1516 Maxwell Newman
286 EFS 20 1523
287 HTTPS 300 1527 Https
288 Key-agreement protocol 14 1529
289 RSA Factoring Challenge 42 1530
290 Harold Keen 4 1533
291 CrossCrypt 6 1536
292 Bifid cipher 17 1536
293 DigiCipher 2 22 1545
294 Root certificate 15 1548
295 Cipher Block Chaining 37 1548
296 LOKI97 14 1553
297 Shugborough House inscription 34 1557
298 Key generation 23 1562
299 Poem code 19 1570
300 Lars Knudsen 18 1574 Lars R. Knudsen
301 Key management 35 1579 Key management protocol
302 Arlington Hall 20 1590
303 Session key 22 1591
304 Replay attack 60 1595
305 W. T. Tutte 16 1605 Bill Tutte
306 Glossary of telecommunications encryption terms 33 1612
307 Anonymous publication 6 1617
308 Cypherpunk 135 1620 Cypherpunks
309 Communications security 13 1625 COMSEC
310 Blinding (cryptography) 9 1631 Blinding
311 Electronic money 80 1633 Digital cash, EFT, Electronic cash
312 Semantic security 16 1643
313 MISTY1 23 1644 MISTY-1, MISTY
314 ISAAC (cipher) 21 1659 ISAAC, ISAAC (cryptography)
315 I. J. Good 9 1665 I.J. Good, Irving Good
316 Clifford Cocks 50 1671
317 DES-X 24 1683 DESX
318 Symmetric key algorithm 190 1683 Symmetric Algorithms, Symmetric algorithm, Symmetric key, Symmetric encryption, Symmetric key cryptography, Symmetric cypher, Shared key, Symmetric cipher
319 Merkle's Puzzles 10 1684 Merkle's puzzles, Ralph Merkle puzzle cryptographic system
320 Tabula recta 33 1685
321 Microdot 35 1685
322 Secure copy 15 1690 SCP, Scp, Secure Copy Protocol, Secure Copy
323 Twofish 142 1695 Twofish encryption algorithm
324 Camellia (cipher) 30 1704
325 BATON 11 1708
326 Ross Anderson 54 1709 Ross J. Anderson
327 Confusion and diffusion 68 1716 Diffusion (cryptography), Confusion (cryptography), Diffusion and confusion
328 Secure Terminal Equipment 23 1721 STE
329 MAGENTA 14 1736 MAGENTA (cipher)
330 Ralph Merkle 27 1742
331 Linear cryptanalysis 77 1758
332 Helix (cipher) 17 1765
333 TWIRL 16 1770
334 Shafi Goldwasser 11 1774 Shafrira Goldwasser
335 3-Way 29 1777 3-WAY
336 Key escrow 30 1779
337 Timing attack 13 1795
338 PC Bruno 36 1809
339 Cryptography newsgroups 3 1829 Sci.crypt
340 Edward Hebern 11 1838 Edward Hugh Hebern
341 Hans Thilo-Schmidt 27 1850 Asch, Hans Thilo Schmidt
342 LibTom Project 4 1860 LibTomNet, LibTomCrypt, LibTomPoly, LibTomMath
343 Arthur Scherbius 40 1865
344 Initialization vector 58 1874 Initialisation vector
345 Commitment scheme 5 1875 Bit commitment
346 Adversary 81 1877
347 Avalanche effect 71 1879 Avalanche (cryptography)
348 Needham-Schroeder 26 1892
349 James Ellis 14 1930
350 David Kahn 27 1931
351 David Wagner 23 1933
352 NTLM 29 1942
353 World War II cryptography 10 1944
354 Tamper resistance 19 1959 Tamper-resistant, Tamper resistant, Tamper-resistance
355 Tommy Flowers 28 1962 Tommy flowers, Thomas Flowers, Thomas Harold Flowers
356 Common Scrambling Algorithm 22 1973
357 Crypto system 11 1975 Cryptosystem
358 Template:Block ciphers 2 2003 Template:Block ciphers
359 Digital timestamping 16 2011
360 Chosen plaintext attack 56 2016 Chosen plaintext, Chosen-text attack, Chosen-plaintext attack, Chosen-plaintext, Adaptive chosen-plaintext attack, Adaptive chosen plaintext attack
361 Confidentiality 100 2056 Data confidentiality
362 Deniable encryption 117 2060 Deniable Encryption
363 Ron Rivest 72 2061 Rivest, Ronald Rivest, Ronald L. Rivest
364 Permutation cipher 43 2076
365 The Gold Bug 81 2121
366 Digital Signature Algorithm 148 2167 DSA
367 Meet-in-the-middle attack 116 2170
368 Block size (cryptography) 54 2183
369 Adaptive chosen ciphertext attack 36 2203 Adaptive chosen-ciphertext attack
370 Knapsack problem 125 2223 0/1 knapsack problem
371 Harvest (computer) 3 2228 Harvest computer
372 [[Biuro Szyfr%F3w]] 0 2238 Biuro Szyfrow
373 Linear feedback shift register 67 2242 LFSR
374 Challenge-response authentication 36 2274
375 Discrete logarithm 77 2293 Discrete log problem, Discrete logarithm problem, Discrete logarithms, Discrete log
376 Key distribution center 16 2297 KDC
377 ID-based cryptography 12 2301 ID Based Cryptography
378 Whitfield Diffie 34 2304 Diffie
379 Phil Zimmermann 28 2321 PhilZimmermann, Philip Zimmermann
380 40-bit encryption 33 2334 40 bit encryption
381 Blum Blum Shub 117 2340
382 Bruce Schneier 74 2342 Schneier
383 Key derivation function 5 2370
384 Merkle-Hellman 40 2370
385 Content-scrambling system 103 2426 Content Scrambling System, Content scrambling system
386 Triple DES 288 2454 3DES, Triple-DES
387 Scrambler 18 2458 Descrambler
388 Horst Feistel 26 2462
389 JN-25 45 2478
390 Zeroise 13 2504 Zeroization
391 RSA-2048 27 2509
392 Al Bhed 19 2510
393 Advanced Encryption Standard process 110 2512 AES process, AES competition, AES contest, Advanced Encryption Standard competition, AES candidate
394 Mod n cryptanalysis 28 2531 Mod-n cryptanalysis
395 Rubber-hose cryptanalysis 49 2543 Rubber hose cryptanalysis
396 Leonard Adleman 43 2560 Len Adleman, Adleman, Leonard M. Adleman, Adleman, Leonard
397 One way function 32 2565 One-way, One way
398 Self-signed certificate 5 2570 Self signed certificate
399 Security engineering 101 2579
400 DRYAD 3 2595 DRYAD (Cryptography)
401 RIPEMD 118 2604 RIPEMD-160
402 [[Le chiffre ind%E9chiffrable]] 0 2605 The unbreakable cypher, Le chifffre indechiffrable
403 [[%C9tienne Bazeries]] 0 2633 Bazeries, Etienne Bazeries
404 Key authentication 29 2643
405 Lorenz cypher 48 2646 Tunny (cryptography), Lorenz cipher, Fish cyphers, TUNNY, Fish ciphers, Lorentz Cipher, Lorentz Cypher, Lorenz Machine, Lorentz Machine
406 The Code Book 12 2658
407 Unicity distance 33 2667 Spurious key
408 Adi Shamir 126 2678
409 The Magic Words are Squeamish Ossifrage 67 2685 Squeamish ossifrage
410 TWINKLE 10 2690
411 SHACAL 19 2710 SHACAL-1, Shacal-2
412 Room 40 33 2720
413 Dictionary attack 58 2734
414 Kasiski examination 43 2760 Kasiski test
415 RC5 82 2767 RC5 cipher, RC5 encryption algorithm
416 MD5CRK 78 2781
417 CAST-128 55 2790 CAST5, CAST, CAST-5
418 Pseudonymity 78 2790
419 Friedrich Kasiski 28 2803 Kasiski, Friedrich Wilhelm Kasiski
420 Dmitry Sklyarov 91 2832 Dmitri Sklyarov, Dimitri Sklyarov, Dimitri Skylarov, Sklyarov, Dimitry Sklyarov, Dimitry Sklyarov, Dimitry Sklyarov
421 Index of coincidence 39 2858 Coincidence counting
422 Frank Rowlett 17 2867
423 Padding (cryptography) 30 2881
424 Secure cryptoprocessor 43 2889
425 NewDES 32 2901
426 Auguste Kerckhoffs 32 2927
427 LOKI 16 2930 LOKI91, LOKI89
428 ElGamal discrete log cryptosystem 91 2938 Elgamal discrete logarithm cryptosystem, El Gamal discrete log cryptosystem, ElGamal, El Gamal, Elgamal, Elgamal discrete log cryptosystem
429 SIGINT 89 2944 Signals intelligence, Sigint, Signals Intelligence, Signal intelligence
430 Man in the middle attack 151 2950 Man-in-the-middle attack, Man in the middle, MITM
431 Cryptonomicon 366 2986 Neal Stephenson/Cryptonomicon
432 Stream cipher 215 2999 Key stream, Combiner-type algorithm
433 Kryptos 195 3030
434 M-94 15 3032 M-94 (cypher)
435 Louis W. Tordella 14 3060
436 Hashcash 49 3076
437 GOST 38 3123
438 Laurence Safford 4 3148
439 John Tiltman 21 3149
440 Certificate authority 137 3164 Certificate Authority
441 Secure multiparty computation 21 3172 Millionaire problem
442 Secure shell 118 3192 SSH, Secure Shell, Ssh
443 Polybius square 61 3213
444 Birthday attack 283 3250
445 Geheimfernschreiber 108 3255 STURGEON (cryptography)
446 MacGuffin (cipher) 33 3265
447 Agnes Meyer Driscoll 21 3301
448 Wi-Fi Protected Access 342 3319
449 Wired Equivalent Privacy 54 3326 WEP
450 RC2 99 3383
451 Bomba (cryptography) 200 3402
452 The Alphabet Cipher 18 3442
453 Power analysis 8 3461
454 Feistel cipher 59 3491 Feistel network, Feistel scheme, Feistel
455 Numbers station 153 3510 Numbers stations, Number station
456 OpenSSH 85 3512 Openssh
457 ADFGVX cipher 34 3542 ADFGVX
458 Certificate revocation list 17 3553 CRL, Certificate Revocation List, Compromised key list
459 Trusted third party 30 3564 Trusted Third Party
460 Secure channel 35 3599
461 NESSIE 34 3611
462 Brute force attack 298 3619 Combinatorial explosion
463 KW-37 20 3688 KWR-37, KWT-37
464 Skipjack (cipher) 125 3692 Skipjack encryption algorithm
465 Illegal prime 114 3706 Illegal prime number
466 Blind signature 21 3755
467 KL-7 58 3814
468 Autokey cipher 99 3820
469 Invisible ink 110 3893
470 Lucifer (cipher) 58 3954 Lucifer cipher
471 EFF DES cracker 90 3960 Deep Crack, Deep crack, DES cracker
472 Weak key 106 3961
473 Government Communications Headquarters 52 3971 GCHQ, GC&CS, Government Code and Cypher School, Government Code and Cipher School
474 Johannes Trithemius 59 4041
475 Key exchange 32 4058
476 TEMPEST 152 4065 Van Eck Phreaking, Emission security, Van Eck radiation, Emissions security, EMSEC
477 Piling-up lemma 24 4076 Piling up lemma
478 Kerckhoffs' law 29 4087 Kerckhoff's principle, Kerckhoffs' principle, Shannon's maxim, Kerkhoffs' law, Kerkhoffs law, Kerckhoffs law, Kirckhoffs law, Kerkchoffs law, Kerchoffs law, Kerchoff's law, Kerchoff's Law, Shannon's Maxim, Kerchoffs' Law, Kerckhoffs' Law, Kerchkoffs' Law, Kerkhoffs' Law
479 XTEA 78 4138
480 PURPLE 28 4151 Purple code, Purple (cryptography)
481 Polyalphabetic cipher 141 4159 Polyalphabetic substitution
482 STU-III 44 4236
483 Typex 185 4242 Type X, TypeX
484 KW-26 35 4250
485 Alice and Bob 87 4303 Characters in cryptography
486 X.509 293 4393
487 Trench code 6 4412
488 International Data Encryption Algorithm 183 4461 IDEA encryption algorithm, IDEA (cipher), Idea encryption
489 Madryga 21 4492
490 Tiny Encryption Algorithm 32 4516 TEA
491 Steganalysis 44 4527
492 Kerberos (protocol) 231 4528
493 Clipper chip 49 4545 Clipper Chip
494 Encryption 635 4549 CipheR, Cipher, Cyphertext, Ciphertext, Cipher text, Decryption, Encryption key, Encryption algorithm, Codetext, Encrypt, Encrypted, Encipher
495 Crypto-anarchism 159 4554 Crypto-anarchy
496 Cryptography standards 22 4621
497 Information security 147 4644 Information systems security, Information assurance, INFOSEC, It security
498 Scytale 116 4652 Skytale
499 Public key certificate 98 4773 Digital certificate, Digital Certificate, Identity certificate, Digital identity certificate
500 Block cipher 297 4828 Codebook algorithm
501 FEAL 36 4829
502 Differential cryptanalysis 171 4856 Differential attack
503 Khufu and Khafre 62 4898 Khafre (cipher), Khufu (cipher)
504 Authentication 240 4925 Authenticate
505 Marian Rejewski 183 4990
506 List of cryptographic key types 4 5044 Transmission security key
507 Playfair cipher 50 5154 Playfair, Playfair square
508 Leone Battista Alberti 58 5229 Leone Battista Alrerti, Leon Battista Alberti, Alberti, Leone Battista, Leone Alberti
509 Plaintext 108 5243
510 Joseph Rochefort 5 5292 John Joseph Rochefort
511 Transport Layer Security 198 5301 Secure Sockets Layer, Transport Layer Security Protocol, Transport layer security, Secure Socket Layer
512 Block cipher modes of operation 145 5391 Electronic codebook, Cipher-block chaining, Cipher feedback, Output feedback, Counter mode, Modes of operation, Block cipher mode of operation
513 Claude E. Shannon 200 5407 Claude Shannon, Claude Elwood Shannon
514 Code talkers 140 5476 Codetalker, Navajo code, Codetalkers
515 SAFER 35 5605 SAFER-K, SAFER (cipher), SAFER SK, SAFER plus, SAFER plus plus
516 EKMS 34 5662 Electronic Key Management System
517 Passphrase 25 5716 Pass-phrase, Pass phrase
518 FNBDT 18 5772
519 Straddling checkerboard 24 5879
520 RC4 213 5957 RC4 Cipher, ARCFOUR, RC4 cipher, RC4 (cipher)
521 Cryptographically secure pseudo-random number generator 134 5972 CSPRNG
522 Side channel attack 31 6001
523 Pseudorandom number generator 226 6097 Pseudorandom number generators, Pseudo-random number generator, Pseudorandom sequence, PRNG, Pseudo Random, Pseudo-random, Pseudo-randomness
524 Beale ciphers 85 6121 Beale Ciphers
525 GNU Privacy Guard 69 6251 Gnu Privacy Guard, GPG, GnuPG, Gnupg, GNUPG
526 Substitution box 48 6276 S-box, Cryptography/s-box, Substitution boxes
527 Zero-knowledge proof 54 6332 Zero knowledge proof, Zero-knowledge
528 SIGSALY 32 6480
529 Bombe 698 6592
530 Herbert Yardley 17 6694 Herbert O. Yardley
531 Hebern rotor machine 62 6767 Hebern Rotor Machine
532 Web of trust 79 6797 Web of Trust
533 Elliptic curve cryptography 218 6859 Elliptical Curve Cryptography
534 Blowfish (cipher) 451 6893 Blowfish encryption algorithm
535 Abraham Sinkov 9 6920
536 Frequency analysis 263 7111
537 Integer factorization 297 7176 Prime factorization, Prime factorisation, Prime decomposition, Integer factorization problem, Integer factorisation
538 Public-key cryptography 263 7241 Private key, Public key, Public key cryptography, Asymmetric key cryptography, Public key encyption, Public key crytography, Public key encryption, Public-key encryption, Public-key, PKC, Non-secret encryption
539 A5/1 59 7268 A5 (cryptography)
540 Computer surveillance 73 7278
541 Asymmetric key algorithm 239 7280 Asymmetric Algorithms, Asymmetric algorithm, Public key algorithm, Asymmetric key, Asymmetric key encryption algorithm, Asymmetric key encryption, Asymmetric cryptography
542 Traffic analysis 72 7292
543 Key (cryptography) 116 7368 CryptographY/Keys, Cryptography/Key, Secret key, Cryptographic keys, Cryptographic key
544 Caesar cipher 173 7402 Shift cipher, Caesar shift cipher
545 Leo Marks 22 7537 Leopold Samuel Marks
546 MD5 985 7635 Md5, MD5 - A Message Digest Algorithm, Md5sum
547 DES supplementary material 20 7677
548 Code (cryptography) 73 7701 Codetext
549 Transposition cipher 122 7779 Transposition (cryptography), Columnar disposition, Transposition (cipher)
550 Cryptographic engineering 27 7785
551 Diffie-Hellman key exchange 99 7798 Diffie-Hellman, Diffie Hellman, Diffie-Hellman-Merkle key exchange, Diffie-Hellman-Merkle
552 Advanced Encryption Standard 398 7856 AES, Rijndael, Rijndael encryption algorithm
553 Running key cipher 27 7964
554 Key signature 262 8157
555 DeCSS 294 8253 DeCSS source code, Decss
556 Security through obscurity 98 8295 Security by obscurity
557 Key size 84 8328 Cryptography/key length, Cryptographic key length, Key length
558 [[Vigen%E8re cipher]] 0 8473 [[Vigen%E8re Cipher]], [[Vigen%E8re cypher]], Vigenere cipher
559 IPsec 63 8654 RFC 2401, IPSEC, Authentication Header, Encapsulating Security Payload, IPSec, IPsec implementations
560 SIGABA 103 8823 Sigaba
561 ROT13 220 9050 Rot13, ROT-13, ROT-47, Rot47, Rot-13, Rot-47, ROT47, ROT 13, Ebg13
562 Burrows-Abadi-Needham logic 15 9097 BAN logic, BAN Logic
563 VENONA project 141 9320 VENONA, Venona, VENONA Project, Venona project, Venona Project
564 Cryptographic hash function 364 9394 Message digest, Cryptographic hash, Cryptographic message digest, One-way hash
565 CRYPTREC 37 9428
566 Snake oil (cryptography) 48 9433 Snake oil cryptography
567 Public key infrastructure 139 9446 PKI, Public Key Infrastructure, Pki
568 Zimmermann Telegram 307 9474 Zimmermann telegram, Zimmerman telegram, Zimmerman Note, The Zimmermann Telegram
569 Bletchley Park 505 9724 Bletchley Park Museum, Station X
570 XSL attack 90 9961
571 Colossus computer 430 9990 Colossus (computer)
572 SHA family 87 10059 SHA, SHA1, SHA-256, SHA-384, SHA-512, SHA-1, Secure Hash Algorithm family, Secure Hash Algorithm, SHA-0, SHA512
573 Password cracking 155 10256
574 Rabin cryptosystem 101 10488
575 Secret sharing 70 10531 Key splitting
576 National Security Agency 401 10979 NSA, Armed Forces Security Agency, AFSA, No such agency, The Puzzle Palace
577 Quadratic sieve 53 11164 Multiple Polynomial Quadratic Sieve
578 Fritz-chip 116 11332
579 List of cryptographers 38 11430 Cryptographer, Cryptographers, Cryptologist
580 Wikipedia:WikiProject Cryptography 59 11621 User:Matt Crypto/prop, Wikipedia:WikiProject Cryptology
581 Digital signature 320 11707 Digital signatures, Digitally Signed
582 Export of cryptography 63 11768
583 Elizebeth Friedman 22 11786 Elizabeth Friedman
584 Steganography 691 11796 Digital watermark, Secret writing, Stegonagraphy, Stegotext
585 William F. Friedman 66 11954 William Friedman, William Frederick Friedman, Wolfe Frederick Friedman
586 ECHELON 908 12424 EcheloN, Eschelon
587 Magic (cryptography) 98 12477 Magic cryptography
588 Bazeries cylinder 9 12555 Bazeries Cylinder
589 Rotor machine 318 12564 Rotor cypher machine
590 RSA 893 13206 RSA Cryptosystem
591 RSA number 83 13269 RSA numbers
592 Computer insecurity 62 13922
593 Electronic voting 180 14348 E-voting, EVoting, E voting, Computer voting, Electronic Voting, Online voting
594 Anonymous remailer 78 14588 Anonymous Remailer, Remailer
595 Alan Turing 1481 14612 Turing, A.M., Alan Mathison Turing
596 NSA encryption systems 43 15124
597 Password 155 15628 Passcode
598 Quantum cryptography 394 16078 Quantum Cryptography
599 Books on cryptography 56 16352
600 M-209 17 16425
601 Cryptography 1202 17718 CryptologY, CryptographY, Cryptology, CryptographY/Hashfunctions, Cryptographic, Codes and ciphers, Decrypting, Crypto, Data encryption, Cyptography
602 Substitution cipher 257 17897 Substitution ciphers, Substitution alphabet, Letter-substitution cipher, Simple substitution cipher, Monoalphabetic substitution cipher
603 One-time pad 319 18083 OneTimePads, One time pads, One time pad, Vernam cipher
604 Cryptanalysis 1985 18187 CryptanalysiS, Cryptanalytic, Cryptoanalysis, Codebreaking, Codebreaker, Cryptanalyst, Code-breaking, Cryptanalysts
605 Topics in cryptography 373 18270 Topics in Cryptography
606 History of cryptography 1435 19824
607 Hardware random number generator 170 21918 True random number generator, Random device, Entropy pool, TRNG, True Random Number Generator
608 Cryptanalysis of the Enigma 1985 22449
609 Digital rights management 1162 23687 Digital Rights Management, Digital-rights management, Digital restrictions management, Digital Restrictions Management
610 Ultra 535 26381 UltrA, Ultra secret, ULTRA
611 Pretty Good Privacy 123 28574 PrettyGoodPrivacy, PGP, Pgp
612 Data Encryption Standard 394 29888 DataEncryptionStandard, Data Encryption Algorithm, DES
613 Enigma machine 6281 32433 Naval Engima, Enigma code machine, Enigma (machine), ENIGMA, Enigma cryptography machine, Enigma code, Enigma cipher machine, Enigma cypher machine, Enigma cipher, Enigma cypher, Naval Enigma, Enigma Machine
614 List of cryptography topics 181 33111 List of cryptology topics