outline_of_cryptography

Outline of Cryptography


Cryptography: History of cryptography | Cryptanalysis | Outline of cryptography | Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers | Steganography (Cryptography navbar)


Short description: Overview of and topical guide to cryptography

The following outline is provided as an overview of and topical guide to cryptography:

Cryptography (or cryptology); practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

Essence of cryptography

Uses of cryptographic techniques

Branches of cryptography

History of cryptography

Ciphers

Classical

Substitution

Transposition

Transposition ciphers:

Modern symmetric-key algorithms

Stream ciphers

Stream ciphers:

Block ciphers

Block ciphers: For further reading, see: Block cipher modes of operation

Modern asymmetric-key algorithms

[[wp>Asymmetric key algorithm]]

Keys

[[Key authentication]]

Transport/exchange

[[Weak key]]s

[[Cryptographic hash function]]s

[[Cryptanalysis]]

Classical

Modern

Robustness properties

Undeciphered historical codes and ciphers

Organizations and selection projects

Cryptography standards

  • Federal Information Processing Standards (FIPS) Publication Program – run by NIST to produce standards in many areas to guide operations of the US Federal government; many FIPS publications are ongoing and related to cryptography
  • American National Standards Institute (ANSI) &ndash; standardization process that produces many standards in many areas; some are cryptography related, ongoing) <!–***we need a list here! – help, please *** –>
  • International Organization for Standardization (ISO) &ndash; standardization process produces many standards in many areas; some are cryptography related, ongoing <!– ***we need a list here! – help, please ***) –>
  • Institute of Electrical and Electronics Engineers (IEEE) &ndash; standardization process produces many standards in many areas; some are cryptography related, ongoing <!– ***we need a list here! – help, please ***) –>
  • Internet Engineering Task Force (IETF) &ndash; standardization process that produces many standards called RFCs) in many areas; some are cryptography related, ongoing)<!–***we need a list here! – help, please *** –>

General cryptographic

<!–

  • and the same for China, France, Germany, India, Russia, etc–>

Open efforts

  • Data Encryption Standard (DES) &ndash; NBS selection process, ended 1976
  • RIPE &ndash; division of the RACE project sponsored by the European Union, ended mid-1980s
  • Advanced Encryption Standard (AES) &ndash; a “break-off” competition sponsored by NIST, ended in 2001
  • NESSIE Project &ndash; an evaluation/selection program sponsored by the European Union, ended in 2002
  • eSTREAM&ndash; program funded by ECRYPT; motivated by the failure of all of the stream ciphers submitted to NESSIE, ended in 2008
  • CRYPTREC &ndash; evaluation/recommendation program sponsored by the Japanese government; draft recommendations published 2003
  • CrypTool &ndash; an e-learning freeware programme in English and German&mdash; exhaustive educational tool about cryptography and cryptanalysis

<!–

  • need a list here, Help, please **** –>

Influential cryptographers

Academic and professional publications

Allied sciences

See also

Snippet from Wikipedia: Outline of cryptography

The following outline is provided as an overview of and topical guide to cryptography:

Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

outline_of_cryptography.txt · Last modified: 2024/04/28 03:20 (external edit)