Table of Contents
Outline of Cryptography
Cryptography: History of cryptography | Cryptanalysis | Outline of cryptography | Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers | Steganography (Cryptography navbar)
Short description: Overview of and topical guide to cryptography
The following outline is provided as an overview of and topical guide to cryptography:
Cryptography (or cryptology); practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Essence of cryptography
Uses of cryptographic techniques
Branches of cryptography
History of cryptography
Ciphers
Classical
Substitution
- Monoalphabetic substitution
-
-
-
Transposition
- VIC cipher; complex hand cipher used by at least one Soviet spy in the early 1950s; it proved quite secure for the time
Modern symmetric-key algorithms
Main: Symmetric-key algorithm
Stream ciphers
- FISH; by Siemens AG
-
- Pike; improvement on FISH by Ross Anderson
- ISAAC; intended as a PRNG
- One-time pad; Vernam and Mauborgne, patented 1919; an extreme stream cipher
- RC4 (ARCFOUR); one of a series by Professor Ron Rivest of MIT; CRYPTREC recommended limited to 128-bit key
-
- ChaCha20; A Salsa20 variant.
-
Block ciphers
Block ciphers: For further reading, see: Block cipher modes of operation
- Feistel cipher; pattern by Horst Feistel
- Advanced Encryption Standard (g>Rijndael); 128-bit block; NIST selection for the AES, FIPS 197; Created 2001—by Joan Daemen and Vincent Rijmen; NESSIE selection; CRYPTREC recommendation.
- Anubis; 128-bit block
- CAST-128 (CAST5); 64-bit block; one of a series of algorithms by Carlisle Adams and Stafford Tavares, insistent that the name is not due to their initials
- CIPHERUNICORN-A; 128-bit block; CRYPTREC recommendation
- CIPHERUNICORN-E; 64-bit block; CRYPTREC recommendation (limited)
- CMEA; cipher used in US cellphones, found to have weaknesses.
- CS-Cipher; 64-bit block
- DEAL; an AES candidate derived from DES
- DES-X; a variant of DES to increase the key size.
- Grand Cru; 128-bit block
- Hierocrypt-3; 128-bit block; CRYPTREC recommendation
- Hierocrypt-L1; 64-bit block; CRYPTREC recommendation (limited)
- IDEA NXT; project name FOX, 64-bit and 128-bit block family; Mediacrypt (Switzerland); by Pascal Junod & Serge Vaudenay of Swiss Institute of Technology Lausanne
- Iraqi Block Cipher (IBC)
- Khufu and Khafre; 64-bit block ciphers
- Kuznyechik; Russian 128-bit block cipher, defined in GOST R 34.12-2015 and RFC 7801.
- LION; block cipher built from stream cipher and hash function, by Ross Anderson
- LOKI89/91; 64-bit block ciphers
- LOKI97; 128-bit block cipher, AES candidate
- MAGENTA; AES candidate
- Mars; AES finalist, by Don Coppersmith et al.
- MISTY2; 128-bit block: Mitsubishi Electric (Japan)
- Nimbus; 64-bit block
- NOEKEON; 128-bit block
- NUSH; variable block length (64-256-bit)
- Q; 128-bit block
- RC2; 64-bit block, variable key length
- RC6; variable block length; AES finalist, by Ron Rivest et al.
- SAFER; variable block length
- SHACAL-1; 160-bit block
-
- Triple DES; by Walter Tuchman, leader of the Lucifer design team—not all triple uses of DES increase security, Tuchman's does; CRYPTREC recommendation (limited), only when used as in FIPS Pub 46-3
- Twofish; 128-bit block; AES finalist by Bruce Schneier et al.
- 3-Way; 96-bit block by Joan Daemen
- Polyalphabetic substitution machine cyphers
- Hybrid code/cypher combinations
- JN-25; WWII Japanese Navy superencyphered code; many variants
- Naval Cypher 3; superencrypted code used by the Royal Navy in the 1930s and into WWII
Modern asymmetric-key algorithms
[[wp>Asymmetric key algorithm]]
-
- Diffie-Hellman; key agreement; CRYPTREC recommendation
- El Gamal; discrete logarithm
- Elliptic curve cryptography; (discrete logarithm variant)
- PSEC-KEM; NESSIE selection asymmetric encryption scheme; NTT (Japan); CRYPTREC recommendation only in DEM construction w/SEC1 parameters
- ECIES; Elliptic Curve Integrated Encryption System, Certicom Corporation
- Merkle–Hellman knapsack cryptosystem; knapsack scheme
- RSA; factoring
- Rabin cryptosystem; factoring
Keys
[[Key authentication]]
Transport/exchange
[[Weak key]]s
- Factorization<ref>
</ref>
[[Cryptographic hash function]]s
-
- TTMAC – (Two-Track-MAC) NESSIE selection MAC; K.U.Leuven (Belgium) & debis AG (Germany)
- MD5 – one of a series of message digest algorithms by Prof Ron Rivest of MIT; 128-bit digest
- SHA-1 – developed at NSA 160-bit digest, an FIPS standard; the first released version was defective and replaced by this; NIST/NSA have released several variants with longer 'digest' lengths; CRYPTREC recommendation (limited)
- SHA-3 – originally known as Keccak; was the winner of the NIST hash function competition using sponge function.
- RIPEMD-160 – developed in Europe for the RIPE project, 160-bit digest; CRYPTREC recommendation (limited)
- RTR0 – one of Retter series; developed by Maciej A. Czyzewski; 160-bit digest
- Tiger – by Ross Anderson et al.
- Snefru – NIST hash function competition
[[Cryptanalysis]]
Classical
Modern
- Symmetric algorithms
- Hash functions:
-
-
- Network attacks
- External attacks
Robustness properties
Undeciphered historical codes and ciphers
Organizations and selection projects
Cryptography standards
- Federal Information Processing Standards (FIPS) Publication Program – run by NIST to produce standards in many areas to guide operations of the US Federal government; many FIPS publications are ongoing and related to cryptography
- American National Standards Institute (ANSI) – standardization process that produces many standards in many areas; some are cryptography related, ongoing) <!–***we need a list here! – help, please *** –>
- International Organization for Standardization (ISO) – standardization process produces many standards in many areas; some are cryptography related, ongoing <!– ***we need a list here! – help, please ***) –>
- Institute of Electrical and Electronics Engineers (IEEE) – standardization process produces many standards in many areas; some are cryptography related, ongoing <!– ***we need a list here! – help, please ***) –>
- Internet Engineering Task Force (IETF) – standardization process that produces many standards called RFCs) in many areas; some are cryptography related, ongoing)<!–***we need a list here! – help, please *** –>
General cryptographic
- National Security Agency (NSA) – internal evaluation/selections, charged with assisting NIST in its cryptographic responsibilities
- Government Communications Headquarters (GCHQ) – internal evaluation/selections, a division is charged with developing and recommending cryptographic standards for the UK government <!– **** we need more information here – help! **** –>
- Communications Security Establishment (CSE) – Canadian intelligence agency
<!–
- and the same for China, France, Germany, India, Russia, etc–>
Open efforts
- Data Encryption Standard (DES) – NBS selection process, ended 1976
- RIPE – division of the RACE project sponsored by the European Union, ended mid-1980s
- Advanced Encryption Standard (AES) – a “break-off” competition sponsored by NIST, ended in 2001
- NESSIE Project – an evaluation/selection program sponsored by the European Union, ended in 2002
- eSTREAM– program funded by ECRYPT; motivated by the failure of all of the stream ciphers submitted to NESSIE, ended in 2008
- CRYPTREC – evaluation/recommendation program sponsored by the Japanese government; draft recommendations published 2003
- CrypTool – an e-learning freeware programme in English and German— exhaustive educational tool about cryptography and cryptanalysis
<!–
- need a list here, Help, please **** –>
Influential cryptographers
Legal issues
-
- Bernstein v. United States - Daniel J. Bernstein's challenge to the restrictions on the export of cryptography from the United States.
- Phil Zimmermann - Arms Export Control Act investigation regarding the PGP software.
-
- RSA – now public domain
- David Chaum – and digital cash
-
-
- Official Secrets Act – United Kingdom, India, Ireland, Malaysia, and formerly New Zealand
- Regulation of Investigatory Powers Act 2000 – United Kingdom
Academic and professional publications
- Cryptologia – quarterly journal focusing on historical aspects
- Communication Theory of Secrecy Systems – cryptography from the viewpoint of information theory
Allied sciences
See also
- Snippet from Wikipedia: Outline of cryptography
The following outline is provided as an overview of and topical guide to cryptography:
Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.