Table of Contents

Outline of Cryptography


Cryptography: History of cryptography | Cryptanalysis | Outline of cryptography | Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers | Steganography (Cryptography navbar)


Short description: Overview of and topical guide to cryptography

The following outline is provided as an overview of and topical guide to cryptography:

Cryptography (or cryptology); practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

Essence of cryptography

Uses of cryptographic techniques

Branches of cryptography

History of cryptography

Main: History of cryptography - Timeline of cryptography

Ciphers

Classical

Substitution

Substitution ciphers:

Transposition

Transposition ciphers:

Modern symmetric-key algorithms

Main: Symmetric-key algorithm

Stream ciphers

Stream ciphers:

Block ciphers

Block ciphers: For further reading, see: Block cipher modes of operation

Modern asymmetric-key algorithms

[[wp>Asymmetric key algorithm]]

Keys

[[Key authentication]]

Transport/exchange

[[Weak key]]s

[[Cryptographic hash function]]s

[[Cryptanalysis]]

Classical

Modern

Robustness properties

Undeciphered historical codes and ciphers

Organizations and selection projects

Cryptography standards

General cryptographic

<!–

Open efforts

<!–

Influential cryptographers

List of cryptographers

Academic and professional publications

Allied sciences

See also

Snippet from Wikipedia: Outline of cryptography

The following outline is provided as an overview of and topical guide to cryptography:

Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.