Outline of cryptography

Outline of cryptography

The following outline is provided as an overview of and topical guide to cryptography:

Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

Contents

Essence of cryptography

Main article: Cryptography

Uses of cryptographic techniques

Branches of cryptography

History of cryptography

Ciphers

Classical

Substitutions

  • Monoalphabetic substitution
  • Polyalphabetic substitution

Transposition

  • Scytale
  • Grille
  • Permutation
  • VICcomplex hand cypher used by at least one Soviet spy in the early 1950s; it proved quite secure for the time

Modern

Symmetric-key algorithms

  • Stream ciphers
  • CipherSaber – (RC4 variant with 10 byte random IV, easy to implement
  • SOBER-t16
  • SOBER-t32
  • Block ciphers
  • CAST-256 (CAST6) – 128-bit block; the successor to CAST-128 and a candidate for the AES competition
  • SAFERvariable block length
  • SC2000128 bit block; CRYPTREC recommendation
  • Serpent128 bit block; AES finalist by Ross Anderson, Eli Biham, Lars Knudsen
  • SHACAL-1160-bit block
  • SHACAL-2256-bit block cypher; NESSIE selection Gemplus (France)
  • Sharkgrandfather of Rijndael/AES, by Daemen and Rijmen
  • Squarefather of Rijndael/AES, by Daemen and Rijmen
  • Polyalphabetic substitution machine cyphers
  • EnigmaWWII German rotor cypher machinemany variants, any user networks for most of the variants
  • Purplehighest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain
  • SIGABAWWII US cypher machine by William Friedman, Frank Rowlett et al.
  • TypeXWWII UK cypher machine
  • Hybrid code/cypher combinations
  • JN-25WWII Japanese Navy superencyphered code; many variants
  • Naval Cypher 3superencrypted code used by the Royal Navy in the 30s and into WWII

Asymmetric key algorithms

  • ACE-KEMNESSIE selection asymmetric encryption scheme; IBM Zurich Research)
  • ACE Encrypt
  • Chor-Rivest
  • Diffie-Hellmankey agreement; CRYPTREC recommendation
  • El Gamaldiscrete logarithm
  • Elliptic curve cryptography – (discrete logarithm variant
  • PSEC-KEMNESSIE selection asymmetric encryption scheme; NTT (Japan); CRYPTREC recommendation only in DEM construction w/SEC1 parameters
  • ECIESElliptic Curve Integrated Encryption System, Certicom Corporation
  • ECIES-KEM
  • ECDHElliptic Curve Diffie-Hellman key agreement, CRYPTREC recommendation
  • RSA-KEMNESSIE selection asymmetric encryption scheme; ISO/IEC 18033-2 draft
  • RSA-OAEPCRYPTREC recommendation
  • Rabin-SAEP
  • HIME(R) –

Keys

Authentication

Transport/exchange

Weak keys

Cryptographic hash functions

  • EMACNESSIE selection MAC
  • HMACNESSIE selection MAC; ISO/IEC 9797-1, FIPS PUB 113 and IETF RFC
  • TTMAC – (Two-Track-MAC) NESSIE selection MAC; K.U.Leuven (Belgium) & debis AG (Germany)
  • UMACNESSIE selection MAC; Intel, UNevada Reno, IBM, Technion, & UC Davis
  • MD5one of a series of message digest algorithms by Prof Ron Rivest of MIT; 128 bit digest
  • SHA-1developed at NSA 160-bit digest, an FIPS standard; the first released version was defective and replaced by this; NIST/NSA have released several variants with longer 'digest' lengths; CRYPTREC recommendation (limited)
  • SHA-256NESSIE selection hash function, FIPS 180-2, 256 bit digest; CRYPTREC recommendation
  • SHA-384NESSIE selection hash function, FIPS 180-2, 384 bit digest; CRYPTREC recommendation
  • SHA-512NESSIE selection hash function, FIPS 180-2, 512 bit digest; CRYPTREC recommendation
  • RIPEMD-160developed in Europe for the RIPE project, 160-bit digest;CRYPTREC recommendation (limited)
  • Tigerby Ross Anderson et al.
  • Snefru
  • WhirlpoolNESSIE selection hash function, Scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium)

Cryptanalysis

Classical

Modern

  • Symmetric algorithms
  • Hash functions:
  • Side channel attacks
  • Network attacks
  • External attacks

Robustness properties

Uncracked codes and ciphers

Organizations and selection projects

Standards

  • Federal Information Processing Standards Publication Programrun by NIST to produce standards in many areas to guide operations of the US Federal government; many FIPS publications are ongoing and related to cryptography
  • ANSIstandardization process that produces many standards in many areas; some are cryptography related, ongoing)
  • ISOstandardization process produces many standards in many areas; some are cryptography related, ongoing
  • IEEEstandardization process produces many standards in many areas; some are cryptography related, ongoing
  • IETFstandardization process that produces many standards called RFCs) in many areas; some are cryptography related, ongoing)

General cryptographic

  • NSAinternal evaluation/selections, charged with assisting NIST in its cryptographic responsibilities
  • GCHQinternal evaluation/selections, a division is charged with developing and recommending cryptographic standards for the UK government
  • DSDAustralian SIGINT agency, part of ECHELON
  • Communications Security Establishment (CSE) – Canadian intelligence agency

Open efforts

  • DESNBS selection process, ended 1976
  • RIPEdivision of the RACE project sponsored by the European Union, ended mid-'80s
  • AESa "break-off" competition sponsored by NIST, ended in 2001
  • NESSIE Projectan evaluation/selection program sponsored by the European Union, ended in 2002
  • eSTREAMprogram funded by ECRYPT; motivated by the failure of all of the stream ciphers submitted to NESSIE, ended in 2008
  • CRYPTRECevaluation/recommendation program sponsored by the Japanese government; draft recommendations published 2003
  • Internet Engineering Task Forcetechnical body responsible for Internet standardsthe Request for Comment series is ongoing
  • CrypToolan e-learning freeware programme in English and Germanexhaustive educational tool about cryptography and cryptanalysis

Influential cryptographers

Cryptography scholars

Legal issues

  • Free speech
  • RSAnow public domain
  • David Chaumand digital cash
  • Cryptography and law enforcement

Academic and professional publications

Further information: Important publications in cryptography & Books on cryptography

Allied sciences

See also

References

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Outline of science — The following outline is provided as an overview of and topical guide to science: Science – in the broadest sense refers to any system of objective knowledge. In a more restricted sense, science refers to a system of acquiring knowledge based on… …   Wikipedia

  • Outline of discrete mathematics — The following outline is presented as an overview of and topical guide to discrete mathematics: Discrete mathematics – study of mathematical structures that are fundamentally discrete rather than continuous. In contrast to real numbers that have… …   Wikipedia

  • Outline of computer science — The following outline is provided as an overview of and topical guide to computer science: Computer science (also called computing science) – study of the theoretical foundations of information and computation and their implementation and… …   Wikipedia

  • Outline of mathematics — Mathematics topics Mathematics articles: 0 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Mathematicians: A B C D E F G H I J K L M N O P Q R S T U V …   Wikipedia

  • Outline of World War II — World War II articles Alphabetical index: 0 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Campaigns  |  Countries  |  Equipment Lists  |  Outline  |  Timeline  |  Portal  | … …   Wikipedia

  • Outline of trigonometry — The following outline is provided as an overview of and topical guide to trigonometry: Trigonometry – branch of mathematics that studies triangles and the relationships between their sides and the angles between these sides. Trigonometry defines… …   Wikipedia

  • Outline of combinatorics — See also: Index of combinatorics articles The following outline is presented as an overview of and topical guide to combinatorics: Combinatorics – branch of mathematics concerning the study of finite or countable discrete structures. Contents 1… …   Wikipedia

  • Outline of computer engineering — Microprocessors, like the Intel 80486DX2 die shown here, are a central component to many Computer Engineering applications. Computer engineering (CE) is the design and development of computer systems. It is often considered a hybrid between… …   Wikipedia

  • Outline of software engineering — See also: Index of software engineering articles The following outline is provided as an overview of and topical guide to software engineering: Software engineering – application of a systematic, disciplined, quantifiable approach to the… …   Wikipedia

Share the article and excerpts

Direct link
https://en-academic.com/dic.nsf/enwiki/11869625 Do a right-click on the link above
and select “Copy Link”