Cryptology: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(Heisenberg's cat's revenge)
imported>Howard C. Berkowitz
No edit summary
Line 1: Line 1:
{{subpages}}
{{subpages}}
{{TOC-right}}
==Underlying principles==
==Underlying principles==
*Information theory
{{r|Information theory}}
*Random numbers
{{r|Random number}}
*Statistical characteristics of language
*Statistical characteristics of language
*Computationally intractable problems
*Computationally intractable problems
Line 11: Line 12:
=====Digital signatures=====
=====Digital signatures=====
=====Key management=====
=====Key management=====
*PKI
*{{r|Public Key Infrastructure}}
*PGP
*{{r|Pretty Good Privacy}}
====Server authentication====
====Server authentication====
===Nonrepudiation===
===Nonrepudiation===

Revision as of 19:16, 27 September 2008

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Please create the "Talk page". Just click this Talk page link and save the page.

Template:TOC-right

Underlying principles

  • Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
  • Random number [r]: A member of a sequence of which the successive values cannot be predicted, produced by measurement of physical phenomena, appropriate algorithms, or a combination of the two [e]
  • Statistical characteristics of language
  • Computationally intractable problems

Methods of proving information is correct or has been transferred

Authentication

Sender authentication

Digital signatures
Key management

Server authentication

Nonrepudiation

Zero-knowledge proofs

Digital signatures

Confidentiality and integrity

Existence confidentiality

Traffic confidentiality

Message content confidentiality

Atomic and sequential integrity

Methods of concealing information

Cryptography

  • Ciphers and codes, including basic methods
  • Symmetric, asymmetric, and both
  • Key management protocols

Specific cipher implementations

Manual
  • Monoalphabetic substitutions
  • Polyalphabetic substitutions
    • Straddling methods
  • Transposition
  • Superencipherment
Mechanical/Electromechanical
  • Jefferson/Bazeries cylinder, strip ciphers
  • Vernam
  • Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
Computer (general purpose and chip) implementations
  • General characteristics of military (KG vs KW, etc.)
  • Non-text/data: secure voice, video, fax
  • DES
  • PGP
  • AES

Steganography

  • Invisible ink methods?
  • Classic covert channel
  • Masking with graphics
  • Spread spectrum, frequency agility, {{seealso|electronic warfare))

Hybrid methods

Methods of obtaining partial or full information

See also: communications intelligence for things including traffic analysis and direction finding
  • Man-in-the-middle attack
  • Various general scenarios: brute force, chosen plaintext
  • Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
  • Advanced mathematical cryptanalysis
  • Red/black engineering and other COMSEC supporting measures
See also: communications intelligence
  • "Practical cryptanalysis" (black bag job), radiofrequency MASINT#Unintentional Radiation MASINT (TEMPEST/Van Eck, etc.), acoustic cryptanalysis
  • "rubber hose cryptanalysis"
    • "This is the most powerful handgun in the world. I can't remember if I've fired five or six times. Feeling lucky, punk?" This is an example of quantum cryptanalysis, with the .44 Magnum chamber is loaded or not loaded, but Heisenberg requires one pull the trigger to find out.