Cryptographic key/Related Articles: Difference between revisions
Jump to navigation
Jump to search
John Leach (talk | contribs) m (Text replacement - "{{r|Cryptology}}↵" to "") |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 19: | Line 19: | ||
{{r|Ciphertext}} | {{r|Ciphertext}} | ||
{{r|Cipher}} | {{r|Cipher}} | ||
{{r|Claude Shannon}} | {{r|Claude Shannon}} | ||
{{r|Cryptography}} | {{r|Cryptography}} | ||
Line 43: | Line 43: | ||
{{Bot-created_related_article_subpage}} | {{Bot-created_related_article_subpage}} | ||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Domain Name System security}} | |||
{{r|Cryptography}} | |||
{{r|Two-way encryption}} |
Latest revision as of 11:00, 3 August 2024
- See also changes related to Cryptographic key, or pages that link to Cryptographic key or to this page or whose text contains "Cryptographic key".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Cryptographic key. Needs checking by a human.
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
- Caesar cipher [r]: One of the first ciphers, developed by Julius Caesar [e]
- Ciphertext [r]: The result of applying a encryption algorithm and an encryption key to plaintext] [e]
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Claude Shannon [r]: (1916-2001) American theoretical mathematician, founder of information theory. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Digital Rights Management [r]: Legal and technical techniques used by media publishers in an attempt to control distribution and usage of distributed video, audio, ebooks, and similar electronic media. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
- JWICS [r]: Add brief definition or description
- Kerckhoffs' Principle [r]: The principle, formulated by Auguste Kerckhoffs, that security in a cipher should not depend on keeping the details of the cipher secret; it should depend only on keeping the key secret. [e]
- Meet-in-the-middle attack [r]: An attack on a block cipher in which the attacker can calculate possible values of the same intermediate variable (the middle) in two independent ways, starting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible values each way and compares the results. [e]
- National Security Agency [r]: An organization within the United States Department of Defense, with the dual roles of the principal signals intelligence agency in the United States intelligence community , but also having the responsibility for information assurance of military, diplomatic, and other critical communications. [e]
- New Zealand [r]: Country in the South Pacific; constitutional monarchy and a member of the Commonwealth of Nations. [e]
- One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
- Plaintext [r]: In cryptography, the unencrypted message [e]
- Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
- United States intelligence community [r]: Add brief definition or description
- Vatican City [r]: Add brief definition or description
- World War II, Pacific [r]: Add brief definition or description
- Domain Name System security [r]: Add brief definition or description
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Two-way encryption [r]: Add brief definition or description
Categories:
- Subpages
- Related Article Subpages
- Mathematics Related Article Subpages
- Computers Related Article Subpages
- Military Related Article Subpages
- All Content
- Mathematics Content
- Computers Content
- Military Content
- Military tag
- Security tag
- Bot-created Related Articles subpages
- Mathematics Bot-created Related Articles subpages
- Computers Bot-created Related Articles subpages
- Military Bot-created Related Articles subpages
- Pages with too many expensive parser function calls