Cryptography
Appearance
Welcome to Cryptography, the study of obfuscating data to unintended recipients.
Part I: Introducing Cryptography
- Introduction to Cryptography
- History of Cryptography
- Fundamental Concepts
Part II: Designing Crypto-systems
- The Basic Principles
- Little Secrets Hide Bigger Secrets
- Open Algorithms and the Value of Peer-Review
- Think Like a Cryptanalyst
- Cryptography/Error Correction Systems
- Mathematical Background
- Computer Security is More Than Encryption
- Unbroken is Not Necessarily Unbreakable
Part III: Cryptanalysis
- The Basic Principles
- Weaknesses
- Attacks
- Breaking Hash Algorithms
- Collisions
- Birthday Attack
- Joux Attack
- Time Memory Trade Off (rainbow tables)
- How Historical Systems Were Broken
Part IV: Using Cryptosystems
- Applying Cryptography
- Digital Signatures
- Database protection
- E-Cash
- E-Voting
- DRM
- Biometrics
- Anonymity
- Classical Ciphers
- Beale Cipher
- Transposition Ciphers
- Caesar cipher
- Atbash Cipher
- Autokey cipher
- Playfair Cipher
- Polyalphabetic substitution
- Scytale
- Substitution cipher
- nomenclator
- Permutation Cipher
- Affine cipher
- Vigenère cipher
- Polybius square
- ADFGVX cipher
- Fractionation (Polybius square, straddling checkerboard, CT-37c conversion table, etc.)
- Contemporary Ciphers
- Symmetric Ciphers
- Asymmetric Ciphers
- Hashes
- MD5
- SHA-1
- SHA-2
- RadioGatún, the direct predecessor of SHA-3
- SHA-3
- RIPEMD-160
- Tiger
- message authentication code (often MAC); A MAC algorithm is sometimes called a keyed (cryptographic) hash function.
- Protocols
- Authentication protocols
- e.g. Kerberos
- Key exchange protocols
- Secure Communications
- e.g. SSL, SSH
- Generate a keypair using OpenSSL
- Authentication protocols
Part V: Cryptography and Society
- The Changing Nature of Cryptographic Use
- Cryptography, Governments and Laws
- Expectations of Normal Users
Part VI: Miscellaneous
- Future Possibilities
- Glossary of Terms
- Further Reading
- Appendix A: Mathematical background
- Currently ungrouped content
Almost all of these topics have articles about them in Wikipedia (there are about 50-100 crypto related articles) so many sections could be imported.
|
Pages to be merged into the text.
Cryptography/Prime Curve/Affine Coordinates
Cryptography/Prime Curve/Chudnovsky Coordinates
Cryptography/Prime Curve/Jacobian Coordinates
Cryptography/Prime Curve/Standard Projective Coordinates
Sources: Wikipedia:cryptography, Wikipedia:Transposition cipher, Wikipedia:Caesar cipher, Wikipedia:Frequency analysis, Wikipedia:Brute-force search. |