- Topics in cryptography
This article is intended to be an 'analytic glossary', or alternatively, an organized collection of annotated pointers.
Classical ciphers
*
Autokey cipher
*Permutation cipher *
Polyalphabetic substitution
**Vigenère cipher *
Polygraphic substitution
**Playfair cipher (byCharles Wheatstone )
**Hill cipher *
Substitution cipher s
**Caesar cipher
***ROT13
**Affine cipher
**Atbash cipher *
Transposition cipher s
**Scytale
**Grille cipher
**VIC cipher (complex hand cypher used by at least one Soviet spy in the early 1950s -- it proved quite secure for the time)Famous ciphertexts
*See
List of famous ciphertexts Attacks on classical ciphers
*Frequency analysis
*Contact analysis
*Kasiski examination
*Index of coincidence Modern algorithms, methods evaluation and selection projects
tandards organizations
*the
Federal Information Processing Standard s Publication program (run byNIST to produce standards in many areas to guide operations of the US Federal government; many FIPS Pubs are cryptography related, ongoing)
*the ANSI standardization process (produces many standards in many areas; some are cryptography related, ongoing)
* ISO standardization process (produces many standards in many areas; some are cryptography related, ongoing)
*IEEE standardization process (produces many standards in many areas; some are cryptography related, ongoing)
*IETF standardization process (produces many standards (called RFCs) in many areas; some are cryptography related, ongoing) SeeCryptography standards Cryptographic organizations
*
NSA internal evaluation/selections (surely extensive, nothing is publicly known of the process or its results for internal use; NSA is charged with assisting NIST in its cryptographic responsibilities)
*GCHQ internal evaluation/selections (surely extensive, nothing is publicly known of the process or its results for GCHQ use; a division of GCHQ is charged with developing and recommending cryptographic standards for the UK government)
*DSD AustralianSIGINT agency - part ofECHELON
*Communications Security Establishment (CSE) — Canadian intelligence agency.Open efforts
*the DES selection (NBS selection process, ended 1976)
*the RIPE division of the RACE project (sponsored by theEuropean Union , ended mid-'80s)
*the AES competition (a 'break-off' sponsored byNIST ; ended 2001)
*theNESSIE Project (evaluation/selection program sponsored by theEuropean Union ; ended 2002)
*theeSTREAM program (ECRYPT -funded; motivated by the failure of all of thestream cipher s submitted toNESSIE ; ended 2008)
*theCRYPTREC program (Japanese government sponsored evaluation/recommendation project; draft recommendations published 2003)
*the Internet Engineering Task Force (technical body responsible for Internet standards -- the Request for Comment series: ongoing)
*theCryptool project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)Cryptographic hash function s (message digest algorithms)*
Cryptographic hash function
*Message authentication code
*Keyed-hash message authentication code
**EMAC (NESSIE selection MAC)
**HMAC (NESSIE selection MAC; ISO/IEC 9797-1, FIPS and IETF RFC)
**TTMAC aka Two-Track-MAC (NESSIE selection MAC; K.U.Leuven (Belgium) & debis AG (Germany))
**UMAC (NESSIE selection MAC; Intel, UNevada Reno, IBM, Technion, & UCal Davis)
*MD5 (one of a series of message digest algorithms by ProfRon Rivest of MIT; 128 bit digest)
*SHA-1 (developed atNSA 160-bit digest, an FIPS standard; the first released version was defective and replaced by this; NIST/NSA have released several variants with longer 'digest' lengths;CRYPTREC recommendation (limited))
**SHA-256 (NESSIE selection hash function, FIPS 180-2, 256 bit digest;CRYPTREC recommendation)
**SHA-384 (NESSIE selection hash function, FIPS 180-2, 384 bit digest;CRYPTREC recommendation)
**SHA-512 (NESSIE selection hash function, FIPS 180-2, 512 bit digest;CRYPTREC recommendation)
*RIPEMD-160 (developed in Europe for the RIPE project, 160-bit digest;CRYPTREC recommendation (limited))
* Tiger (byRoss Anderson et al)
* Snefru
* Whirlpool (NESSIE selection hash function, Scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium))Public key / private key encryption algorithms (aka
asymmetric key algorithm s)*
ACE-KEM (NESSIE selection asymmetric encryption scheme; IBM Zurich Research)
**ACE Encrypt
*Chor-Rivest
*Diffie-Hellman (key agreement;CRYPTREC recommendation)
*El Gamal (discrete logarithm)
*Elliptic curve cryptography (discrete logarithm variant)
**PSEC-KEM (NESSIE selection asymmetric encryption scheme; NTT (Japan);CRYPTREC recommendation only in DEM construction w/SEC1 parameters) )
**ECIES (Elliptic Curve Integrated Encryption System; Certicom Corp)
**ECIES-KEM
**ECDH (Elliptic Curve Diffie-Hellman key agreement;CRYPTREC recommendation)
* EPOC
*Merkle-Hellman (knapsack scheme)
*McEliece
*NTRUEncrypt
*RSA (factoring)
**RSA-KEM (NESSIE selection asymmetric encryption scheme; ISO/IEC 18033-2 draft)
**RSA-OAEP (CRYPTREC recommendation)
*Rabin cryptosystem (factoring)
**Rabin-SAEP
**HIME(R)
*XTR
*Threshold cryptosystem Public key / private key signature algorithms
*
Digital Signature Algorithm (from NSA, part of the Digital Signature Standard (DSS);CRYPTREC recommendation)
*Elliptic Curve DSA (NESSIE selection digital signature scheme; Certicom Corp);CRYPTREC recommendation as ANSI X9.62, SEC1)
*Schnorr signature s
* RSA signatures
**RSA-PSS (NESSIE selection digital signature scheme; RSA Laboratories);CRYPTREC recommendation)
*RSASSA-PKCS1 v1.5 (CRYPTREC recommendation)
*Nyberg-Rueppel signature s
*MQV protocol
*Gennaro-Halevi-Rabin signature
*Cramer-Shoup signature
*One-time signature s
**Lamport signature
**Bos-Chaum signature
*Undeniable signature s
**Chaum-van Antwerpen signature
*Fail-stop signature s
*Ong-Schnorr-Shamir signature
*Birational permutation
*ESIGN
**ESIGN-D
**ESIGN-R
*Direct anonymous attestation
*NTRUSign
*SFLASH (NESSIE selection digital signature scheme (esp for smartcard applications and similar); Schlumberger (France))
* QuartzKey authentication
*
Key authentication
*Public key infrastructure
**X.509
*Public key certificate
**Certificate authority
**Certificate revocation list
*ID-based cryptography
*Certificate-based encryption
*Secure key issuing cryptography
*Certificateless cryptography
*Merkle treeAnonymous identification scheme
*
GPS (NESSIE selection anonymous identification scheme; Ecole Normale Supérieure, France Télécom, & La Poste)Secret key algorithms (aka
symmetric key algorithm s)*
Stream cipher s
**A5/1 ,A5/2 (cyphers specified for theGSM cellular telephone standard)
**BMGL
** Chameleon
** FISH (by Siemens AG)
** WWII 'Fish' cyphers
***Geheimfernschreiber (WWII mechanical onetime pad bySiemens AG , called STURGEON byBletchley Park )
*** Schlusselzusatz (WWII mechanical onetime pad byLorenz , calledtunny byBletchley Park )
** HELIX
** ISAAC (intended as a PRNG)
** Leviathan
**LILI-128
**MUGI (CRYPTREC recommendation)
**MULTI-S01 (CRYPTREC recommendation)
**One-time pad (Vernam and Mauborgne, patented mid-'20s; an extreme stream cypher)
** Panama
** Pike (improvement on FISH byRoss Anderson )
** RC4 (ARCFOUR) (one of a series by Prof Ron Rivest of MIT;CRYPTREC recommendation (limited to 128-bit key))
**CipherSaber (RC4 variant with 10 byte randomIV , easy to implement)
**Salsa20 , aneSTREAM recommended cipher
** SEAL
**SNOW
**SOBER
***SOBER-t16
***SOBER-t32
** WAKE*
Block cipher s
**Block cipher modes of operation
**Product cipher
**Feistel cipher (block cypher design pattern byHorst Feistel )
**Advanced Encryption Standard (128 bit block;NIST selection for the AES, FIPS 197, 2001 -- byJoan Daemen andVincent Rijmen ;NESSIE selection;CRYPTREC recommendation)
**Anubis (128-bit block)
**BEAR (block cypher built from stream cypher and hash function, byRoss Anderson )
**Blowfish (64 bit block; byBruce Schneier , et al)
**Camellia (128 bit block;NESSIE selection (NTT & Mitsubishi Electric);CRYPTREC recommendation)
**CAST-128 (CAST5 ) (64 bit block; one of a series of algorithms byCarlisle Adams andStafford Tavares , who are insistent (indeed, adamant) that the name is not due to their initials)
**CAST-256 (CAST6 ) (128-bit block; the successor to CAST-128 and a candidate for the AES competition)
**CIPHERUNICORN-A (128 bit block;CRYPTREC recommendation)
**CIPHERUNICORN-E (64 bit block;CRYPTREC recommendation (limited))
**CMEA — cipher used in US cellphones, found to have weaknesses.
**CS-Cipher (64 bit block)
**Data Encryption Standard (DES) (64 bit block; FIPS 46-3, 1976)
**DEAL — an AES candidate derived from DES
**DES-X A variant of DES to increase the key size.
**FEAL
**GDES — a DES variant designed to speed up encryption.
**Grand Cru (128 bit block)
**Hierocrypt-3 (128 bit block;CRYPTREC recommendation))
**Hierocrypt-L1 (64 bit block;CRYPTREC recommendation (limited))
**IDEA NXT (project name FOX, 64-bit and 128-bit block family; Mediacrypt (Switzerland); byPascal Junod &Serge Vaudenay of Swiss Institute of Technology Lausanne)
**International Data Encryption Algorithm (IDEA) (64 bit block --James Massey &X Lai ofETH Zurich)
**Iraqi Block Cipher (IBC)
**KASUMI (64-bit block; based onMISTY1 , adopted for next generationW-CDMA cellular phone security)
**KHAZAD (64-bit block designed by Barretto and Rijmen)
**Khufu and Khafre (64-bit block ciphers)
**LION (block cypher built from stream cypher and hash function, byRoss Anderson )
**LOKI89/91 (64-bit block ciphers)
**LOKI97 (128-bit block cipher, AES candidate)
**Lucifer (by Tuchman et al ofIBM , early 1970s; modified byNSA /NBS and released as DES)
**MAGENTA (AES candidate)
**Mars (AES finalist, byDon Coppersmith et al)
**MISTY1 (NESSIE selection 64-bit block; Mitsubishi Electric (Japan);CRYPTREC recommendation (limited))
**MISTY2 (128 bit block: Mitsubishi Electric (Japan))
**Nimbus (64 bit block)
**NOEKEON (128 bit block)
**NUSH (variable block length (64 - 256 bits))
**Q (128 bit block)
**RC2 64-bit block, variable key length.
**RC6 (variable block length; AES finalist, byRon Rivest et al)
**RC5 (byRon Rivest )
**SAFER (variable block length)
**SC2000 (128 bit block;CRYPTREC recommendation)
**Serpent (128 bit block; AES finalist byRoss Anderson ,Eli Biham ,Lars Knudsen )
**SHACAL-1 (160-bit block)
**SHACAL-2 (256-bit block cypher;NESSIE selection Gemplus (France))
**Shark (grandfather ofRijndael /AES, by Daemen and Rijmen)
**Square (father ofRijndael /AES, by Daemen and Rijmen)
**3-Way (96 bit block byJoan Daemen )
**TEA (by David Wheeler &Roger Needham )
**Triple DES (byWalter Tuchman , leader of the Lucifer design team -- not all triple uses of DES increase security, Tuchman's does;CRYPTREC recommendation (limited), only when used as in FIPS Pub 46-3)
**Twofish (128 bit block; AES finalist byBruce Schneier , et al)
**XTEA (by David Wheeler &Roger Needham )*Polyalphabetic substitution machine cyphers
**Enigma (WWII German rotor cypher machine -- many variants, many user networks for most of the variants)
** Purple (highest security WWII Japanese Foreign Office cypher machine; by Japanese Navy Captain)
**SIGABA (WWII US cypher machine byWilliam Friedman ,Frank Rowlett , et al)
**TypeX (WWII UK cypher machine)*Hybrid code/cypher combinations
**JN-25 (WWII Japanese Navy superencyphered code; many variants)
**Naval Cypher 3 (superencrypted code used by the Royal Navy in the 30s and into WWII)*
Visual cryptography
=Classified cryptography (U.S.)=*
EKMS NSA 's Electronic Key Management System
*FNBDT NSA 's secure narrow band voice standard
*Fortezza encryption based on portable crypto token inPC Card format
*KW-26 ROMULUS teletype encryptor (1960s - 1980s)
*KY-57 VINSON tactical radio voice encryption
*SINCGARS tactical radio with cryptographically controlled frequency hopping
*STE secure telephone
*STU-III older secure telephone
*TEMPEST prevents compromising emanations
*Type 1 product sBreaking ciphers
*
Passive attack
*Chosen plaintext attack
*Chosen ciphertext attack
*Adaptive chosen ciphertext attack
*Brute force attack
**Cryptographic key length
**Unicity distance
*Cryptanalysis
**Meet-in-the-middle attack
**Differential cryptanalysis
**Linear cryptanalysis
**Slide attack cryptanalysis
**Algebraic cryptanalysis
**XSL attack
**Mod n cryptanalysis Weak keys and password-based cryptography
*
Brute force attack
*Dictionary attack
*Related key attack
*Key derivation function
*Key strengthening
*Weak key
*Password
*Password-authenticated key agreement
*Passphrase
* SaltKey transport/exchange
*
BAN Logic
*Diffie-Hellman
*Man-in-the-middle attack
*Needham-Schroeder
*Offline private key
*Otway-Rees
*Trusted paper key
*Wide Mouth Frog Pseudo- and true random number generators
*
PRNG
*CSPRNG
*Hardware random number generator s
*Blum Blum Shub
* Yarrow (by Schneier, et al)
* Fortuna (by Schneier, et al)
* ISAAC
* RPNG based on SHA-1 in ANSI X9.42-2001 Annex C.1 (CRYPTREC example)
* PRNG based on SHA-1 for general purposes inFIPS Pub 186-2 (inc change notice 1) Appendix 3.1 (CRYPTREC example)
* PRNG based on SHA-1 for general purposes inFIPS Pub 186-2 (inc change notice 1) revised Appendix 3.1 (CRYPTREC example)Anonymous communication
*
Dining cryptographers protocol (byDavid Chaum )
*Anonymous remailer
*Pseudonymity
*Anonymous internet banking
*Onion routing Legal issues
*Cryptography as
free speech
**"Bernstein v. United States "
**"Junger v. Daley "
**DeCSS
**Phil Zimmermann
*Export of cryptography
*Key escrow andClipper Chip
*Digital Millennium Copyright Act
*Digital Rights Management (DRM)
*Cryptographypatents
**RSA (now public domain}
**David Chaum and digital cash
*Cryptography and law enforcement
**Wiretaps
**Espionage
*Cryptography laws in different nations
**Official Secrets Act (United Kingdom )
**Regulation of Investigatory Powers Act 2000 (United Kingdom )Terminology
*
Cryptographic key
*Cipher
*Ciphertext
*Plaintext
*Code
*Tabula recta Books and publications
*
Books on cryptography
* Important publications in cryptographyCryptographers
* See
List of cryptographers Uses of cryptographic techniques
*
Commitment scheme s
*Secure multiparty computation s
*Electronic voting
*Authentication
*Digital signature s
*Cryptographic engineering
*Crypto system sRobustness properties
*
Provable security
*Random oracle model
*Ciphertext indistinguishability
*Semantic security
*MalleabilityMiscellaneous
*
Ban (information)
*Echelon
*Espionage
*IACR
*Ultra
*Security engineering
*SIGINT
*Steganography
*Cryptographers
*SSL
*Quantum cryptography
*Kish cypher
*Crypto-anarchism
*Cypherpunk
*Key escrow
*Zero-knowledge proof s
*Blind signature
*Blinding (cryptography)
*Digital timestamping
*Secret sharing
*Trusted operating system s
*Trusted paper key Free / open-source cryptosystems (ie, algorithms + protocols + system design)
*PGP (a name for any of several related crypto systems, some of which, beginning with the acquisition of the name by Network Associates, have not been
Free Software in the GNU sense)
*FileCrypt (an open source/commercial command line version of PGP from Veridis of Denmark, see PGP)
*GPG (an open source implementation of theOpenPGP IETF standard crypto system)
*SSH (Secure SHell implementing cryptographically protected variants of several common Unix utilities, First developed as open source in Finland byTatu Ylönen . There is nowOpenSSH , an open source implementation supporting both SSH v1 and SSH v2 protocols. There are also commercial implementations.
*IPsec (Internet Protocol SecurityIETF standard, a mandatory component of theIPv6 IETF standard)
*Free S/WAN (an open source implementation of IPsec)
*Cryptool project (e-learning programme in English and German; freeware; exhaustive educational tool about cryptography and cryptanalysis)
Wikimedia Foundation. 2010.